22.01.2014 Views

Proceedings (PDF) - Internet Engineering Task Force

Proceedings (PDF) - Internet Engineering Task Force

Proceedings (PDF) - Internet Engineering Task Force

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

PROCEEDINGS OF THE THIRTEENTH<br />

INTERNET ENGINEERING TASK FORCE<br />

APRIL 11-14, 1989<br />

COCOA BEACH, FLORIDA<br />

Compiled<br />

and Edited<br />

by<br />

Phill Gross<br />

Karen L. Bowers<br />

May 1989


Acknowledgements<br />

The Thirteenth IETF Meeting was held at the Cocoa Beach<br />

Hilton and Towers at Cocoa Beach, Florida on April 11-14,<br />

1989. On behalf of the IETF I would like to thank Susie<br />

Karlson (ACE) for making this a successful and smooth running<br />

session; she was .faced with many a challenge in a somewhat<br />

"user hostile" hotel setting and came through with flying<br />

colors. A special thanks to you, Susie, for the great on<br />

site support!!<br />

Though we were unable to make use of the conference<br />

facilities at the training center of the Kennedy Space<br />

Center, we certainly enjoyed being sponsored by the<br />

hospitable Dave Roberts (NASA EL-ESS-4 Office). Dave and his<br />

associates, Dale Pope, Dick Batton and Jack Martin personally<br />

treated us to a VIP tour of the KSC. Logistics were<br />

orchestrated by Mitch Barnes of the Public Affairs Office.<br />

Thank you all for the first class touch this tour placed on a<br />

very productive four day meeting.<br />

The final thank you goes again to Monica Hart (NRI) whose<br />

relentless efforts have greatly improved the format and<br />

quality of these <strong>Proceedings</strong>.<br />

Karen L.<br />

Bowers


Table of Contents<br />

II.<br />

III.<br />

IVo<br />

V.<br />

Chairman’s Message ....................................<br />

page 1<br />

Chairman’s Luncheon ...................................<br />

page<br />

IETF Attendees .......................<br />

..... page 19<br />

Final Agenda .................................<br />

......... page 31<br />

Working Group Summaries ...............................<br />

page 37<br />

Alert Management<br />

...................................... page [39<br />

Authentication ...............................<br />

.......... page 43<br />

CMIP-0ver-TCP ....................................<br />

...... page 49<br />

Domain<br />

................................................ page 51<br />

Dynamic Host Configuration ............................<br />

page 57<br />

Host Requirements .....................................<br />

page 6;3<br />

Interconnectivity .....................................<br />

page 615<br />

<strong>Internet</strong> MIB<br />

....... page 618<br />

JOMANN .......................<br />

......................... page 70<br />

LAN Manager .................................<br />

.......... page 74<br />

Network Information Services Infrastructure (NISI) .... page 84<br />

Network Management Services Interface .................<br />

page 90<br />

NOC-TOols .................................<br />

............ page 94<br />

Open SPF-based IGP<br />

.................................... page 102<br />

Open Systems Routing ..................................<br />

page 106<br />

OSI ................<br />

............ ¯ °page 1(38<br />

PDN Routing .................... page<br />

Point-to-Point Protocol<br />

................................ page 150<br />

ST and Connection IP ...............................<br />

..... page 162<br />

Telnet Linemode .......................................<br />

page 17’2<br />

User Documents<br />

........................................ page 174<br />

User Services<br />

............ ............................. page 178


Page 2<br />

Table of Contents<br />

VI.<br />

Network Status Briefings and Technical Presentations ..page 186<br />

Everything You Ever Wanted to Know About OSPFIGP<br />

(John Moy) .................. ¯ ........................ page 188<br />

The Open Routing Architecture (Marianne Lepp) ......... page 204<br />

Report on the NASA Science <strong>Internet</strong> (Milo Medin) ...... page 212<br />

State of the <strong>Internet</strong> (Zbigniew Opalka) ............... page 232<br />

Growth of the <strong>Internet</strong> (Mike St. Johns) ............... page 244<br />

Report on the DOE Energy Science Network (Tony Hain) ..page 250<br />

An Interim Routing Architecture (Russ Mundy) .......... page 262<br />

Architectural Changes to the NSFNET (Elise Gerich) .... page 266<br />

Nifty NSFNet Statistics (Elise Gerich and Dave Katz) ..page 290<br />

Inter Autonomous System Routing Alternatives<br />

(Yakov Rekhter) ..................................... page 302<br />

Requiem for the Arpanet (Vinton G. Cerf) .............. page 308<br />

Arpanet Evaporation Timetable (Phill Gross) ........... page 313<br />

Mailbridge Access Control (Marianne Lepp) ............. page 321<br />

The DCA TCP/IP Certification Program (Martin Gross) ...page 327<br />

Header Compression for TCP/IP Datagrams (Van Jacobson).page 343<br />

VII.<br />

Papers Distributed at IETF ............................ page 359<br />

<strong>Internet</strong> Cluster Addressing and Its Application to<br />

Public Data Networks ................................ page 361<br />

Hierarchial Van-Gateway Algorithms and PDN-Cluster<br />

Addressing Scheme for Worldwide Interoperation<br />

between Local TCP/IP Networks via X.25 Networks ..... page 371<br />

NVLAP Program Handbook: Computer Network Interface<br />

Protocols/DOD High Level Protoco].s (Requirements<br />

for Accreditation) .................................. page 381<br />

Executive Summary: Cornell Worm Report ............... page 403


I. Chairman’s Message<br />

Phill Gross<br />

NRI


Chairman’ s Message<br />

An Important<br />

Anniversary<br />

The April II-14 1989 meeting of the IETF coincided closely with the<br />

anniversary of a significant event. On April 7, 1969, RFC 1 was issued.<br />

The title was "Host Software"<br />

¢<br />

and the author was Steve Crocker<br />

It was interesting to read this paper from a twenty.year vantage<br />

point.<br />

Quoting from RFC l:<br />

"Introduction<br />

The software for the ARPA network exists partly in the IMPs and<br />

partly in the respective HOSTs. BB&N has specified the software in the<br />

IMPs and it is the responsibility of the HOST groups to agree on the<br />

HOST software.<br />

During the summer of 1968, representatives from the initial<br />

four sites met several times to discuss the HOST software and<br />

initial experiments on the network. There emerged from these<br />

meetings a working group oo.<br />

I present here some of the tentative agreements reached and some of<br />

the open questions encountered. VERY LITTLE OF WHAT IS ]~ERE IS FIRM<br />

[emphasis added] and reactions are expected ....<br />

Some Requirements Upon the Host-to-Host Software<br />

... As with any new facility, there will be a period of very light usage<br />

until the community of users oo begins to depend on it. . . It seems<br />

natural to provide the abilit~ to use any remote HOST as i~ it had been<br />

dialed from a TTY (teletype) terminal° Additionally, we would like some<br />

ability to transmit a file in a somewhat different manner perhaps than<br />

simulating a teletype ....<br />

One of the inherent problems in the network is the fact that all<br />

responses from a remote HOST will require on the order of a half-second<br />

or so, no matter how simple. For teletype use, we could shift to a<br />

half-duplex local-echo arrangement, but this would destroy some<br />

of the usefulness of the network."<br />

Working Groups, host requirements (unfirm host requirements, we should<br />

note!), and the expectation that a community of users will grow to<br />

depend on network communication -- there is much prophesy in this<br />

first RFC! We can also see the roots of TELNET and FTP.<br />

In reading RFC l, I was struck by how much has changed over 20 years,<br />

and yet how many of the challenges and fundamental problems remain today.<br />

Twenty years ago there were four IMP sites on the world’s only packet<br />

switching network. Today there are 10’s of 1000’s of hosts and 100’s<br />

of 1000’s of users reachable on an international <strong>Internet</strong> of low-1000’s<br />

of networks. The growth of the !ETF has mirrored that pattern. The


Page 2<br />

Chairman’s<br />

Message<br />

group had its origins in a 15 person working party of government contractors<br />

in the mid-80’s. Typical meetings are now nearly ten times that large<br />

with a large vendor and user constituency. When we first formed<br />

working groups, there were four; now there are 22 with several others<br />

in various stages of formation. Of these working groups, the IETF<br />

currently has a working group still attempting to firm up host rquirements<br />

and the Telnet WG is still dealing with the issue of a line oriented<br />

local-echo.<br />

However, the continued need for such groups is more an indication of the<br />

incredible growth and change in the environment, rather than an indication<br />

of a lack of progress. We have always been victimized, by the growth and<br />

demand created by the abundance of technical success, rather than the lack<br />

of success. So, challenges certainly remain. But judging from the<br />

particularly sharp technical progress in recent meetings, I believe we<br />

have the right to celebrate this notable anniversary in style.<br />

(Thanks to Bob Braden (ISI) for noting the anniversary of RFC<br />

Another Significant Milestone<br />

At the June 1988 IETF meeting in Annapolis, Mark Pullen of DARPA renorted<br />

that the Arpanet was being decon~nissioned. Plans for this remarkable<br />

event have become firm, and the initial actions are being taken. The<br />

Arpanet Evaporation schedule, as provided by DARPA, was reported at<br />

the April 1989 meeting. The slides speak for themselves, and little needs<br />

to be added. However, Vint Cerf, considered by many to be the father<br />

of the Arpanet, has provided a touching perspective on the subject. Please<br />

enjoy.<br />

The April 1989 Meet’ing<br />

Fifteen Working Groups met at the Cocoa Beach IETF. Two new WGs<br />

met for the first time. These new groups are the NOC Tools catalogue<br />

WG and the Dynamic Configuration WG. Another experimental WG to examine<br />

a possible unified network management interface also met for the first time,<br />

but it has not yet been decided to continue that effort. Since April, two<br />

other groups have formed under the auspices of the User Services WG. These<br />

are the Network Information Services Infrastructure WG and the User<br />

Documents bibliography WG. Descriptions and reports on all these activities<br />

are contained in these <strong>Proceedings</strong>.<br />

Three other WGs had progressed to the point of making detailed<br />

technical reports to the Plenary. These WGs are Interconnectivity,<br />

Open Routing, and Open OSF Routing. There was even a minority<br />

report to the IWG’s proposal for a mid-term routing architecture.<br />

Just prior to the April meeting, Cornell released "Tihe Computer Worm" report<br />

resulting from an internal investigation. Jeff Schiller, who had previewed<br />

the report, was kind enough to give an unscheduled, di.scussion of that report<br />

to the Plenary. The conclusion section of the Cornell report has<br />

been included in these <strong>Proceedings</strong>°<br />

-4-


Page 3<br />

Chairman’s<br />

Message<br />

Other News<br />

Responding to a vote of attendees at the January 1989 IETF meeting in Austin<br />

Texas, the April meeting was extended to 3.5 days. The first two days<br />

were devoted fully to Working Grohp sessions, the third day was devoted<br />

fully to technical presentations, and the concluding half day was devoted<br />

to reports from the Working Groups. This increased the number of sessions<br />

for working group meetings, where much of the technical work. is pursued,<br />

from three to four.<br />

At the April meeting in Cocoa Beach, we held a luncheon for the Working<br />

Group chairs to receive feedback on this and other actions (See Section<br />

II for more details). At this luncheon, a second refinement was suggested<br />

to give even more time for Working~Groups activity. Tihe suggested schedule<br />

was:<br />

Days l and 2<br />

9 am - 12 WG Morning session<br />

1 pm - 4 pm WG Afternoon session<br />

4 pm - 5:30 pm Technical Presentations (in Plenary)<br />

Day 3<br />

9 am - 12 WG Morning session<br />

1 pm - 5:30 pm Technical Presentations (in Plenary)<br />

Day 4<br />

9 am - 12 WG Reports<br />

This gives an additional period for WG sessions, making a total of five<br />

sessions, but retains the overall time available for technical Plenary<br />

presentations. This will reduce the number of overlapping WGs meetings.<br />

This format will be tried as an experiment at the next several meetings.<br />

-5-


IETF Working Group Status<br />

(April 1989)<br />

Working Groups<br />

ALERTMAN<br />

Authentication<br />

CMIP-over-TCP (CMOT)<br />

DNS (new)<br />

Dyn. Host Config. (new)<br />

Host Requirements<br />

Interconnectivity<br />

<strong>Internet</strong> MIB<br />

JoMann/NSFnet Req Mon.<br />

LAN Mgr MIB<br />

NISI (new)<br />

NM Ser Interface<br />

NOC Tools (new)<br />

RFC or Met Current,<br />

Draft? Apt 89? Report?<br />

Yes<br />

Yes<br />

Yes Yes Yes<br />

Yes No -<br />

Yes Yes Yes<br />

Yes<br />

Yes<br />

Yes No -<br />

Yes Yes Yes<br />

Yes No -<br />

Yes Yes Yes<br />

No Yes Yes<br />

May 89 Yes<br />

Yes<br />

Yes<br />

Yes<br />

Yes<br />

Chair or POC<br />

(address)<br />

Louis Steinberg<br />

louiss@ibm.com<br />

(IBM)<br />

Jeff Schiller (MIT)<br />

j is@athena, mit. edu<br />

Jon Rochlis (MIT)<br />

j on@athena, mit. edu<br />

Lee LaBarre (MITRE)<br />

cel@mitre.org<br />

Paul Mockapetris<br />

pvm@isi.edu<br />

(ISI)<br />

Ralph Droms (Bucknell)<br />

droms@cs.purdue.edu<br />

Bob Braden (ISI)<br />

braden@isi.edu<br />

Guy Almes (Rice)<br />

almes@rice.edu<br />

Craig Partridge (BBN)<br />

craig@nnsc.nsf.net<br />

Susan Hares (Merit)<br />

skh@merit.edu<br />

Amatzia Ben-Artzi (Stan)<br />

amatzi@spd. 3mail. 3com. corn<br />

Karen Bowers (NRI)<br />

bowers@sccgate.scc.com<br />

Phill Gross (NRI)<br />

gross@sccgateoscc.com<br />

Jeff Case (UTK)<br />

case@utkcs2.cs.utk.edu<br />

Bob Enger (Contel)<br />

enger@sccgate.scc.com<br />

-7-


IETF Working Group Status<br />

Page 2<br />

Working Groups RFC or Met Current<br />

Draft? Apr 89? Report,?<br />

Chair or POC<br />

(address)<br />

OSPF<br />

Yes Yes Yes<br />

Mike Petry (UMD)<br />

petry@trantor, umd. edu<br />

John Moy (Proteon)<br />

jmoy@proteon.com<br />

Open Systems<br />

Routing<br />

Yes Mar 89<br />

Marianne Lepp (BBN)<br />

mlepp@bbn.com<br />

OSI Interoperability<br />

No Yes Yes<br />

Ross Callon (DEC)<br />

callon@erlang.dec.com<br />

Rob Hagens (UWISC)<br />

hagens@cs.wisc.edu<br />

PDN Routing<br />

Group<br />

No Yes YES<br />

CH Rokitansky(Fern<br />

roki@isi.edu or<br />

roki@dhafeu52.bitnet<br />

Univ)<br />

Performance<br />

and CC<br />

Yes Yes Yes<br />

Allison Mankin (MITRE)<br />

mankin@gateway.mitre.org<br />

Pt-Pt Protocol<br />

Yes Yes Yes<br />

Drew Perkins (CMU)<br />

ddp@andrew, cmu.edu<br />

Russ Hobby (UC Davis)<br />

rdhobby@ucdavis.edu<br />

ST and CO-IP<br />

No Yes Yes<br />

Claudio Topolcic<br />

topolcic@bbn.com<br />

(BBN)<br />

TELNET Linemode<br />

Yes No Yes<br />

Dave Borman (Cray)<br />

dab@cray.com<br />

User Documents<br />

(new)<br />

Jun 89 Yes<br />

Karen Roubicek (NSF)<br />

roubicek@nnsc.nsf.net<br />

Tracey LaQuey (UTexas)<br />

tracy@emx.utexas.edu<br />

User Services<br />

No Yes Yes<br />

Karen Bowers (NRI)<br />

bowers@sccgate.scc.com<br />

Future IETF Meetinq<br />

Sites<br />

25-28 July 1989<br />

31 Oct - 3 Nov 1989<br />

6-9 February 1990<br />

1-4 May 1990<br />

31 Jul - 3 Aug 1990<br />

~,~ovember 1990<br />

February 1991<br />

Stanford University<br />

University of Hawaii<br />

Florida State University<br />

Pittsburgh Supercomputer Center<br />

University of Washington<br />

Princeton<br />

OPEN - VOLUNTEERS encouraged! !<br />

-8-


II. Chairman’s Luncheon<br />

Karen L. Bowers<br />

NRI<br />

-9-


The Corporation for National Research Initiatives has a<br />

cooperative agreement with the National Science Foundation to<br />

provide overall technical guidance to the IETF. This technical<br />

guidance includes IETF high-level planning and direction,<br />

identification of <strong>Internet</strong> issues, and organization and guidance<br />

to appropriate Working Groups to address these issues. In order<br />

to concentrate our efforts more fully on the primary goal of<br />

technical guidance, we embarked on a short-term effort "to<br />

streamline such administrative necessities as <strong>Proceedings</strong><br />

preparation, quarterly meeting planning, and working group<br />

reporting.<br />

A luncheon for Working Group chairs was held on April 12, 1989.<br />

The purpose of this session was to provide all Working Group<br />

chairs with essential information on how these new procedures<br />

would facilitate their technical reporting and distribution of<br />

information.<br />

The Chairman’s Luncheon briefing outlined the current IETF and<br />

<strong>Internet</strong>-Draft Directory activities and contents; the procedure<br />

employed in preparation of the <strong>Proceedings</strong> and the associated<br />

formats for the WG Charter (Form 2), the Status Update (Form<br />

and Current Meeting Report; and an overview of activity in<br />

progress between the quarterly IETF meetings (slides attached).<br />

Two distinct directories, the IETF Directory. and the <strong>Internet</strong><br />

Drafts Directory, will be maintained on line ~o better facilitate<br />

progress of the IETF and to provide public access to information<br />

important to IETF members and newcomers alike.<br />

The IETF Directory (to be in place shortly) will consist of files<br />

containing: a general IETF description, the Working Group Matrix,<br />

meeting dates/locations, current meeting information, a READ ME<br />

file with a high level overview of the IETF Directory, and<br />

individual Working Group files. Each Working Group will have a<br />

file dedicated to its particular activities and will contain a<br />

Charter (Form 2), a Status Update (Form 3) and the most Current<br />

Meeting Report.<br />

The <strong>Internet</strong>-Draft Directory (in place now) is a repository<br />

working <strong>Internet</strong>-Drafts made available for review and comment,in<br />

preparation for transition to full RFC status, as appropriate.<br />

This directory will soon contain a READ ME file and Index-<br />

Abstract to aid the reader in locating files of interest and<br />

points of contact for each <strong>Internet</strong>-Draft. <strong>Internet</strong>-Drafts ar.e<br />

installed as they are made available to the IETF Office and are<br />

done so in RFC format, to facilitate document submission to the<br />

RFC editor. Eleven <strong>Internet</strong> Drafts are currently installed inthe<br />

<strong>Internet</strong> Draft Directory; nine are queued up to be installed<br />

shortly.<br />

The procedures for preparation of the quarterly IETF <strong>Proceedings</strong><br />

are currently under revision. The goal is to better capture the<br />

accomplishments of the individual Working Groups as well as<br />

improve the quality and format of the document itself. This


includes timely distribution of the <strong>Proceedings</strong> to the Working<br />

Group Chairs and IETF meeting attendees. To assist in this<br />

process all Working Group Chairs and technical briefers are<br />

requested to provide their input as soon as possible upon their<br />

return home from the IETF meeting, preferably within the fiu~t<br />

two weeks. Their early submission will result in an expeditad<br />

release of the <strong>Proceedings</strong> to the printers and in turn to WG<br />

Chairs, IETF attendees and the like.<br />

Activity between the quarterly meetings is ongoing. WG Chairs<br />

hold interim meetings and video teleconferences; WG member3<br />

continue their work on identified priorities; mid-term meeting<br />

reports are submitted to the IETF Chairman; new and revised<br />

<strong>Internet</strong>-Drafts are installed in the <strong>Internet</strong>-Draft Directory; .<br />

the agenda for the next IETF ~.~uarterly meeting is drafted and<br />

finalized through joint participation of all the WG Chairs; and<br />

arrangements for the next quarterly IETF meeting are announced<br />

and finalized.<br />

This is an iterative process, which when firmly in place, will<br />

greatly assist the IETF’s primary technical mission.<br />

Karen L.<br />

Bowers


-13-


0<br />

~=~<br />

+~ 0<br />

D<br />

-14-


III.<br />

IETF Attendees


0<br />

~.~<br />

0<br />

~r~O<br />

.~ o~ o~1 o’~ o<br />

~ I<br />

,-4<br />

-2i-


-22-<br />

0


0 0<br />

-24-


-25-


o~<br />

0<br />

0<br />

,,~


0<br />

~27-


-2 8-


-29-


IV. Final<br />

Agenda


Agenda for the April 11-14 IETF Meeting<br />

TUESDAY,<br />

APRIL llth<br />

9:00 am Opening Plenary, Introductions and iLocal Arrangements<br />

Phill Gross (NRI)<br />

9:15 am Morning Working Group Sessions<br />

o OSPFIGP (Petry, UMD and Moy, Proteon)<br />

o Network Management Services Interface<br />

(Case, UTK and McCloghrie , TWG)<br />

o OSI Interoperation (Callon, DEC and Hagens, UWisc)<br />

o Performance and Congestion Control, TCP Subgroup<br />

(Mankin, Mitre)<br />

o Point-Point Protocol (Perkins, ~U and Hobby,<br />

(UCDavis)<br />

o User Services (Bowers, NRI)<br />

12 : ~ 0 pm Lunch Break<br />

1:30 pm Afternoon Working Group Sessions<br />

o Authentication (Schiller, MIT and Rochlis, MIT)<br />

o I2%NMAN (Ben-Artzi, 3Com)<br />

o OSI Interoperation (Callon, DEC and Hagens, UWisc)<br />

o Performance and Congestion Control (Mankin, Mitre)<br />

(Open Meeting, but attendees are expected to<br />

have reviewed, and prepared comments on, the<br />

draft Gateway Congestion Control paper. Send<br />

to mankin@gateway.mitre.org for a copy.)<br />

o Point-Point Protocol (Perkins, CMU and Hobby,<br />

(UCDavis)<br />

o User Services (Bowers, NRI)<br />

5:00 pm Recess (for the those not attending the DMS WG session)<br />

5:00 pm Domain Name System WG~(convened by Drew Perkins, CMU)<br />

- 6:30 pm<br />

-33-


WEDNESDAY,<br />

APRIL 12th<br />

9:00 am Opening Plenary<br />

9:15 am Morning Working Group Sessions<br />

o NOC Tools (Enger, Contel and Stine, Sparta)<br />

o Joint Interconnectivity and Open Routing WGs<br />

(Almes, Rice and Lepp, BBN)<br />

o Public Data Network Routing (RoMitanski, FERN)<br />

(Open meeting)<br />

o Performance and Congestion Control (Mankin, Mitre)<br />

(Editing session for WG members only)<br />

o ST and Connection IP (Topolcic, BBN)<br />

o ALERTMAN (Louis steinberg, IBM)<br />

12:15 pm Lunch Break<br />

12:30 pm Working Lunch of the WG Chairs<br />

o IETF Office Update (Bowers, NRI)<br />

1:30 pm Afternoon Working Group Sessions<br />

5:00 pm Recess<br />

o Host Dynamic Confi.guration (Droms, Bucknell and<br />

P.Gross, NRI)<br />

o Interconnectivity (Almes, Rice)<br />

o Public Data Network Routing (Rokitanski, FERN)<br />

(Members Only)<br />

o Performance and Congestion Control (Mankin, Mitre)<br />

(Editing session for WG members only)<br />

o ST and Connection IP (Topolcic~ BBN)<br />

7:30 pm o Joint Monitoring Access for (NSFNET) Adjacent<br />

Networks<br />

(Gerich, Merit)


THURSDAY,<br />

APRIL 13th<br />

9"00 am Opening Plenary<br />

9:10 am Everything You Ever Wanted to Know about OSPFIGP<br />

(including how to pronounce it) (Moy, Proteon)<br />

10:00 am The Open Routing Architecture (Lepp, BBN)<br />

10:45 am Break<br />

ii:00 am Report on the NASA Science <strong>Internet</strong> (Medin, Ames)<br />

11:50 am State of the <strong>Internet</strong> (Opalka, BBN)<br />

12:10 pm Growth of the <strong>Internet</strong> (St. ~ohns~ ]8600)<br />

12:30 noon Lunch Break<br />

1:45 pm Report on the DOE Energy Science Network (ESNET)<br />

(Hain, LBL)<br />

2:00 pm An Interim Routing Architecture (Mundy, DCA B600)<br />

2:15 pm NSFNET Report<br />

o Architectural Changes to NSFNET (Gerich, MERIT)<br />

o Nifty NSFNET Stats, using NNStat (Gerich, MERIT)<br />

2:45 pm Interim Routing Architecture (an Alternative View)<br />

(Rekhter, IBM)<br />

2:55 pm Arpanet Evaporation Timetable and An Overview of<br />

FRICC Initiatives (eg, the NNT, RIB,. and RIG)<br />

(P.Gross, NRI)<br />

3:05 pm Mailbridge Access Control (Lepp, BBN)<br />

3:15 pm Authentication WG Report (Schiller, MIT)<br />

3:30 pm Break<br />

3:45 pm Cornell Worm Report Commentary (Schiller, MIT)<br />

3:55 pm The DCA TCP/IP Certification Program<br />

(M. Gross, DCA-DCEC)<br />

4:15 pm Header Compression for TCP/IP Datagrams<br />

(Van Jacobson, LBL)<br />

5:00 pm Recess<br />

-35-


FRIDAY, APRIL 14th<br />

9:00 am Opening Plenary<br />

9:15 am Working Group Reports and Discussion<br />

10:30 am Break<br />

o Network Management Services Interface<br />

(Case, UTK and McCloghrie, TWG)<br />

o LANMAN (Ben-Artzi, 3Com)<br />

(Hares, Merit)<br />

o OSI Interoperation (Callon, DEC and Hagens, UWisc)<br />

o Joint Monitoring ~ccess for (NISFNET) Adjacent<br />

Networks<br />

o User Services (Bowers, NRI)<br />

o Performance and Congestion Control (Mankin, Mitre)<br />

o Point-Point Protocol (Perkins, CMU and<br />

Hobby, UCDavis)<br />

o ST and Connection IP (Topolcic, BBN)<br />

10:45 am Working Group Reports and Discussion<br />

o ALERTMAN (Steinberg, IBM)<br />

o Host Dynamic Configuration (Droms, Bucknell and<br />

P.Gross, NRI)<br />

o NOC Tools (Enger, Contel and Stine, Sparta)<br />

o Domain Name System (Perkins, CMU)<br />

o Public Data Network Routing (Rokitanski, FERN)<br />

11:30 pm Concluding Plenary Remarks and Group Discussion<br />

12:00 pm Adjourn<br />

-36-


V. Working Group Summaries<br />

o Charters<br />

0<br />

0<br />

0<br />

Status Updates<br />

Current Meeting Reports<br />

Slides Presented at IETF<br />

(if available)


Alert Management Working Group<br />

Chairperson: Louis Steinberg/IBM<br />

CHARTER<br />

Description<br />

of Working Group:<br />

The Alert Management Working Group is chartered with<br />

defining and developing techniques to manage the flow<br />

of asynchronously generated information between a<br />

manager (NOC) and its remote managed entities.<br />

The output of this group should be fully compatible<br />

with the letter and spirit of SNMP (RFC 1067) and<br />

CMOT (RFC 1095).<br />

Specific<br />

Objectives:<br />

Develop, implement, and test protocols and mechanisms<br />

to prevent a managed entity from burdening a manager<br />

with an unreasonable amount of unexpected network<br />

management information. This will ifocus on controlling<br />

mechanisms once the information has been generated by a<br />

remote device.<br />

o Write an RFC detailing the above, including examples of<br />

its conforment use with both SNMP traps and CMOT<br />

events.<br />

o<br />

~<br />

Develop, implement, and test mechanisms to prevent a<br />

managed entity from generating locally an excess of<br />

alerts to be controlled. This system will focus on how<br />

a protocol or MIB object might internally prevent<br />

itself from generating an unreasonable amount of<br />

information; examples of such techniques might include<br />

limiting number of alerts per time period, delayed<br />

reporting of "good news" (as in the ].ink up sgmp trap<br />

on NSFNET), or the use of thresholds.<br />

Write an RFC detailing the above. Since the<br />

implementation of these mechanisms is protocol<br />

dependent, the goal of this RFC would be to offer<br />

guidance only. It would request a status of<br />

"optional".<br />

Estimated Timeframe for Completion:<br />

A draft of the first RFC (alert flow control) will<br />

written and reviewed by the July IETF meeting, with final<br />

review expected at the October IETF meeting. The second RFC<br />

draft will be submitted for initial review at the October<br />

IETF meeting. A date for final review of this document has<br />

not yet been determined.


Alert Management Working Group<br />

Chairperson: ]Louis Steinberg/IBM<br />

STATUS UPDATE<br />

i. Chairperson: Lou Steinberg~ louiss@ibm, com<br />

2. WG Mailing list: alert-man@merit, edu and<br />

alertoman-request@merit,<br />

edu<br />

3. Last Meeting (and first): Cocoa Beach, FL, April 12, 1989<br />

4. Next Meeting: Stanford, July 25-28, 1989<br />

5. Progress to date: Initial review of topics, defining what<br />

we are attempting t.o accomplish.<br />

5. Pending or new objectives: see objectives in Charter<br />

6. Progress to date (e.g.,, documents produced):<br />

o initial review of topics and defining what we are<br />

attempting to accomplish


Alert Management Working Group<br />

Chairperson: Louis Steinberg/IBM<br />

CURRENT MEETING REPORT<br />

Reported by Louis Steinberg<br />

AGENDA<br />

ATTENDEES<br />

Introduction<br />

Discussion of group’s charter and goals<br />

Chair’s action items<br />

establish mailing list<br />

write first draftof "information flow management"<br />

document<br />

~-Cathy Aronson<br />

Amatzia Ben-Artzi<br />

Jeff Case<br />

John Chao<br />

John Cook<br />

Chuck Davin<br />

Mark Fedor<br />

Lionel Geretz<br />

Bob Harris<br />

Steven Hunter<br />

Tom Hytry<br />

Lee Labarre<br />

Charles Lynn<br />

Keith McCloghrie<br />

Bill Norton<br />

Joel Replogle<br />

Greg Satz<br />

Bruce J. Schofield<br />

John Scott<br />

Jim Sheridan<br />

Robert Stine<br />

Steve Waldbusser<br />

Dan Wintringham<br />

cja@merit.edu<br />

amatzia@spd.3+o3com.com<br />

case@utkuxl.utk.edu<br />

jchao@bbn.com<br />

cook@chipcom.com<br />

jrd@ptt.lcs.mit,,edu<br />

fedor@nisc.nyser,,net<br />

lionel@salt.acc.com<br />

bharris@bbn.com<br />

hunter@nmfecc.llnl.gov<br />

tlh@iwles@att<br />

cel@mbunix.mitre.org<br />

clynn@bbn.com<br />

kzm@twg.com<br />

wbn@merit.edu<br />

jr@ncsa.uiuc.edu<br />

satz@cisco.com<br />

schofield@edn-vax.dcaomil<br />

scott@dg-rtp.dg.com<br />

jsherida@ibm.com<br />

stine@sparta.com<br />

sw01@andrew, cmu.edu<br />

danw@igloo.osc.edu<br />

MINUTES<br />

The first meeting of the Alert Management Working Group began<br />

with an introduction from the Chairman (Lou Steinberg).<br />

A discussion of the goals of this group then followed. It was<br />

decided that the output of this group must take great care to not<br />

impact the letter or spirit of either the SNMP or CMOT RFCs. Each<br />

document produced will demonstrate the use of proposed alert<br />

management techniques in a manner conferment with both SNMP and<br />

CMOT.<br />

-41-


Page 2<br />

Alert Management<br />

Working Group<br />

Several divisions were proposed for the work’~ to be done.<br />

Lou discussed his interpretation, in which he focused on (i) the<br />

flow of previously generate.d alerts and (2) managed MIB objects<br />

to generate them. Examples of each were briefly cited, as Lou<br />

has already coded and tested these ideas°<br />

Jeff Case expressed strong concern that the Working Group not<br />

focus on managed MIB objects to generate ale.rts. The feeling of<br />

many SNMP implementors was that this would violate the philosophy<br />

of SNMP, which uses the protocol (rather than managed objects)<br />

generate traps. While some SNMP users may be using such objects<br />

in the experimental space of the MIB, it is inconsistent to<br />

define such variables. Doing so (even with ’~optional" MIB<br />

objects), would make the MIB appear to be slanted towards use<br />

with CMOT.<br />

Lee LaBarre presented the (.~4IP view of Events, and the areas that<br />

ISO looks at to manage them. This was basically a superset of<br />

Lou’s view.<br />

The desire to develop techniques fully compatible with both SNMP<br />

and CMOT led to a decision that two RFCs would be submitted. The<br />

first would deal with managing the flow of information caused by<br />

asynch, generated alerts. The second (with a requested<br />

status of "optional") would discuss techniques for generating<br />

such alerts that are self-limiting; those that do not allow an<br />

excess of alerts to be generated.<br />

Lou agreed to set up a mailing list for the group. He did not<br />

think that ibm.com was available, and agreed to look for an<br />

alternative (SNMP @ nisc.nyser.net was suggested for a start).<br />

Lou also took the action item to write up a draft of the first<br />

("flow") document, describing some of the systems he has used.<br />

This will be posted to the list for initial review.


Authentication Working Group<br />

Chairperson: Jeffrey Schiller/MIT<br />

CHARTER<br />

Description<br />

of Working Group:<br />

To brainstorm issues relating to providing for the security<br />

and integrity of information on the <strong>Internet</strong>, with emphasis<br />

on those protocols used to operate and control the network.<br />

To propose open standard solutions to problems in network<br />

authentication.<br />

Specific Objectives:<br />

RFC specifying an authentication format which<br />

supports multiple authentication systems.<br />

¯<br />

¯<br />

Document discussing the cost/benefi,t tradeoffs of<br />

various generic approaches to solving the<br />

authentication problem in the Interlnet context.<br />

Document to act as a protocol designers guide to<br />

authentication.<br />

o RFC proposing A Key Distribution System (emphasis on<br />

"A" as opposed to "THE"). MIT’s Kerberos seems the most<br />

likely candidate here.<br />

Estimated Timeframe for Completion:<br />

This working group will hopefully complete its current<br />

objectives within one year. At this point the group with<br />

either disband or will move on to other related<br />

problems/issues.<br />

-43-


Authentication Working Group<br />

Chairperson: Jeffrey Schiller/MIT<br />

STATUS UPDATE<br />

Chairperson: Jeffrey Schiller, jis@bitsy.mitoedu<br />

¯<br />

WG Mailing list:<br />

AWG@BITSY.MIToEDU<br />

Last Meeting: Cocoa Beach April 1989<br />

¯<br />

Next Meeting:<br />

To Be Scheduled<br />

¯<br />

Pending or New Objectives:<br />

o<br />

Progress to Date (e.g., documents produced):<br />

A draft RFC was circulated at the last meeting to proposing<br />

a standard authentication format for multiple protocols<br />

(addresses object [I] above).<br />

A draft "Authentication Requirements" document was also<br />

circulated. This is the beginning of an effort that will<br />

lead to writing a protocol, designers guide to authentication<br />

(addresses objective [3 ] above)<br />

A draft RFC for the Kerberos Authentication system was<br />

circulated as well (addresses objective [4] above).<br />

-44-


Authentication Working Group<br />

Chairperson: Jeffrey Schiller/MIT<br />

CURRENT MEETING REPORT<br />

Reported by Jeffrey Schiller<br />

ATTENDEES<br />

-Danny Cohen<br />

John Cook<br />

Charles Eldridge<br />

Hunaid Engineer<br />

Phill Gross<br />

Mike Karels<br />

Steve Knight<br />

Lee LaBarre<br />

Norbert Leser<br />

Louis Mamakos<br />

Don Merritt<br />

John Moy<br />

Russ Mundy<br />

Jeff Schiller<br />

Mike St. Johns<br />

Ross Veach<br />

Ste~e Waldbusser<br />

MINUTES<br />

cohen@isioedu<br />

cook@chipcom.com<br />

eldridge@sparta.com<br />

hunaid@hall.cray.com<br />

gross@sccgate.scc.com<br />

karels@berkeley.edu<br />

knight@baldmt.cray.com<br />

cel@mbunix.mitre.org<br />

nl@osf.org<br />

louie@trantor.umd.edu<br />

merritt@brl.mil<br />

jmoy@proteon.com<br />

mundy @beast.ddn.mil<br />

jis@bitsy.mit.edu<br />

stjohns@beast.ddn.mil<br />

rrv@uxc.cso.uiuc.edu<br />

sw01@andrew.cmuoedu<br />

Three handouts were distributed at the beginning of the meeting,,<br />

i. First Draft of an Authentication Requirements document<br />

currently being authored by Jon Rochlis.<br />

2. A copy of a Draft RFC for Version 4 of the Kerberos<br />

Authentication System authored by Jennifer Steiner.<br />

3. A copy of a Draft RFC for a new IP option for IP level<br />

authentication by Jeffrey Schiller.<br />

Most of the discussion at the meeting was on the IP option<br />

draft paper. This paper proposes the creation of a new IP option<br />

for carrying a cryptographic checksum of selected portions of the<br />

packet’s IP header and the entire data contents of the packet.<br />

Its primary use would be as a mechanism to permit the addition of<br />

authentication to already existing protocols that currently have<br />

no provision for carrying authentication information within the<br />

protocol’s own data contents.<br />

The members of the working group discussed the document and<br />

proposed several modifications. The meeting came to a consensus<br />

on the modifications.<br />

Action Items:<br />

Jeffrey Schiller will put together another version of the IP<br />

option document and will distribute it to the members for<br />

consideration.<br />

-45-


CMIP-over-TCP<br />

Chairperson:<br />

(CMOT) Working Group<br />

Lee LaBarre/Mitre<br />

CHARTER<br />

Description<br />

of Working Group:<br />

Develop a long term approach to management of the<br />

<strong>Internet</strong> based on the OSI Network Management Framework<br />

and the Common Management Information Protocol (CMIP).<br />

Provide input to the OSI standards process based on<br />

experience in the <strong>Internet</strong>, and thereby influence the<br />

final form of OSI International Standards on network<br />

management, in particular CMIS/P.<br />

Specific<br />

a)<br />

b)<br />

c)<br />

d)<br />

e)<br />

f)<br />

Objectives:<br />

Develop prototype implementors agreements on CMIP over<br />

TCP.<br />

Develop prototype implementations based on the CMOT<br />

agreements and IETF SMI and MIB agreements.<br />

Experiment with CMOT and extensions to the SMI and MIB.<br />

Develop final implementors agreements for CMOTo<br />

Promote development of products based on CMOT.<br />

Provide input to the OSI Network Management standards<br />

process in time to effect the International Standards.<br />

Estimated Timeframe for Completion:<br />

The group’s work should be completed by June 1989.<br />

-49-


CMIP-over-TCP (CMOT) Working Group<br />

Chairperson: Lee LaBarre/Mitre<br />

STATUS UPDATE<br />

i. Chairperson: Lee LaBarre, cel@mitre, org. corn<br />

2. WG Mailing List: netman@gatewayomitre..org<br />

3. Last meeting: 19 January~ 1989, Austin~ Texas<br />

4. Next Meeting: TBD as required<br />

5. Pending or New Objectives:<br />

The remaining<br />

tasks for the group include:<br />

- updating the specification when the OSI standards<br />

reach international standard (IS) status,<br />

- specification of ew~nt generation and event report<br />

control mechanisms.<br />

The latter task has moved to a subgroup of the MIB WG.<br />

However, if it is decided that generic event generation and<br />

report control mechanisms are not desired, then this group<br />

will address the problem.<br />

®<br />

Progress to date (e.g., documents produced):<br />

o RFCI095, "The Common Management Information Services<br />

and Protocol over TCP/IP (CMOT", edited by U. Warrier<br />

and L. Besaw<br />

The group has completed a major portion of its charter<br />

to develop a long term approach to network<br />

management, namely an specification of an architecture<br />

and protocol that is consistent with OSI and will<br />

facilitate management of future networks containing<br />

TCP/IP and OSI components. That specification,<br />

contained in RFCI095, is based on the DIS version of<br />

CMIP, and on <strong>Internet</strong> RFCs. The RFC1095 and the new<br />

SNMP RFCI098 have been given equal status by the IAB.<br />

CURRENT MEETING<br />

REPORT<br />

None<br />

-5 O-


Domain Working Group<br />

Chairperson: Paul Mockapetris/USC/ISI<br />

CHARTER<br />

Description<br />

of Working Group:<br />

The goal of the Domain Working Group is to advise on the<br />

administration of the top levels of the DNS ("the root<br />

servers"), consider proposed extensions and additions to the<br />

DNS structure and data types, and resolve operational<br />

problems as they occur.<br />

Specific Objectives:<br />

The specific short-term objectives are:<br />

2.<br />

3o<br />

4.<br />

5o<br />

6.<br />

Adding load balancing capability to the DNS.<br />

Adding DNS variables to the MIB.<br />

Implementation catalog for DNS software.<br />

Responsible Person Record.<br />

Adding network naming capability to the DNS.<br />

Evaluate short term measures to improve, or at least<br />

describe the security of the DNS.<br />

Estimated Timeframe for Completion (for above objectives):<br />

l® The preferred method for Load Balancing was decided<br />

upon at the April ’89 IETF meeting at Cocoa Beach.<br />

short RFC will be written before the next meeting in<br />

July ’89.<br />

A<br />

2. End of 1989<br />

~ Questionaire sent, responses data being organized,<br />

sua~mary and detail to appear. (PVM)<br />

4. July w89.<br />

5o RFC issued April 89, implementations to follow.<br />

-51-


Domain Working Group<br />

Chairperson: Paul Mockapetris/USC/ISI<br />

STATUS UPDATE<br />

i. Chairpersons: Permanent - Paul Mockapetris (pvm@isi.edu)<br />

Temporary - Drew Perkins (ddp@andrew.cmuoedu)<br />

2. WG Mailing Lists(s): namedroppers@sri-nic.arpa<br />

3. Date of Last Meeting: April ’89p Cocoa Beach<br />

4. Date of Next Meeting: July ’89, Stanford University<br />

5. Pending or New Objectives: see Charter<br />

6o Progess to Date (e.g., documents produced):<br />

o RFC ll01 - on Network Name Mapping<br />

o Advice to <strong>Internet</strong> Host Requirements Editor<br />

-52-


Domain Working Group<br />

Chairperson: Paul Mockapetris/USC/ISI<br />

CURRENT<br />

Reported<br />

MEETING REPORT<br />

by Drew Perkins<br />

AGENDA<br />

What should the DWG suggest<br />

WG.<br />

to the Host Requirements<br />

2. How do DNS processes appear in the MIBo<br />

3o<br />

Policy on load balancing.<br />

ATTENDEES<br />

4. Addition of dynamic add and delete to the DNS.<br />

° Firm up the rules for defining new types and classes,<br />

and the interpretation of wildcards.<br />

6. Implementation catalog for DNS software°<br />

7. A test/validation suite for the DNS.<br />

8. Enhancements to the DNS in general.<br />

..... Momhammad Alaghebandan<br />

Philip Almquist<br />

Cathy Aronson<br />

Dave Borman<br />

Mike Collins<br />

Mark Fedor<br />

Jose Garcia-Luna<br />

Elise Gerich<br />

Mike ~arels<br />

Steve Knight<br />

Tracy LaQuey<br />

Mark. Lotter<br />

Paul Love<br />

Russ Mundy<br />

Bill Norton<br />

Bill Nowicki<br />

Drew Perkins<br />

Rex Pugh<br />

Mary Stahl<br />

Mike St. Johns<br />

Zaw-Sing Su<br />

Paul Tsuchiya<br />

mra@bridge2.3com, com<br />

almquist@jessica.stanford.edu<br />

cja@merit.edu<br />

dab@cray.com<br />

collins@ccc.mfecc.llnl.gov<br />

fedor@nisc.nyser.net<br />

garcia@sri.com<br />

epg@merit.edu<br />

karels@berkeley.edu<br />

knight@baldmt.cray.com<br />

tracy@emx.utexas°edu<br />

mlk@sri-nic.arpa<br />

loveep@sds.sdsc.edu<br />

mundy@beast.ddn.mil<br />

wbn@merit.edu<br />

nowicki@sun.com<br />

ddp@andrew.cmu.edu<br />

pugh%hprnd@hplabs.hp.com<br />

stahl@sri-nic.arpa<br />

stjohns@beast.ddn.mil<br />

zsu@sri.com<br />

tsuchiya@gateway.mitreoorg<br />

-53-


Page 2<br />

Domain Working<br />

Group<br />

MINUTES<br />

The Domain WG met at theApril "89 IETF in Cocoa Beach, Fla.<br />

Since Paul Mockapetris (ISI), the pe].~anent chairman of the<br />

Domain WG, was unable to attend the meeting, Drew Perkins (C~J)<br />

filled in as temporary chairman.~<br />

The group quickly decided that no one in attendance had any<br />

strong desires to talk about.any of the issues with the exception<br />

of Load Balancing. This happened to be the main concern of the<br />

temporary chairman, so the rest of the meeting was spent<br />

discussing it.<br />

The goal of "load balancing" is to use the DNS as a tool to<br />

dynamically balance the load across some nu~er of servers° The<br />

particular situation is as follows. There are a number of server<br />

machines HOST1, HOST2, HOST3, etc. Each of these machines is<br />

connected to a network file system and appear identical to users<br />

(with the exception of the host name of course). Users would<br />

like to simply say "TELNET HOST "~ and be connected to the least<br />

loaded host° It was decided that there were a nu~tber of ways of<br />

accomplishing this, most of them using the DNS.<br />

i. The TELNET application could use some protocol to find out<br />

the load across all servers whenever a user wanted to<br />

connect to a server. It could then pick the least loaded<br />

system. This of course has the disadw~ntage that every<br />

TELNET application must be modified. Therefore this<br />

possibility was rejected.<br />

. A new DNS Load Balancing Resource Record (LB) could<br />

defined. This record could be similar to the MX record for<br />

mail. There would be one record for each system. These<br />

records would be continuously given new preference values,<br />

and would always have a small TTL, preferably zero. Again,<br />

this choice would require modifying ewery implementation of<br />

TELNET, so it was rejected.<br />

A single CNAME RR could be used to dynamically alias HOST to<br />

HOSTn. This RR would always have a small TTL (zero) and<br />

would be changed dynamically to reflect the least loaded<br />

machine. For example, at first HOST1 imay be the least<br />

loaded, so there would be an RR "HOST 0 IN CNAME HOST1". If<br />

the load on HOST1 increased so that HOST2 became the least<br />

loaded, then this RR would be be removed and a new RR would<br />

be added: "HOST 0 IN CNAME HOST2".<br />

. A dynamically sorted list of A RRs could be used. The<br />

domain "HOST" could include the same A RRs as HOST1, HOST2,<br />

etc. These RRs would be sent with small TTLs and would be<br />

resorted as the load on each machine changed.<br />

-54-


Page 3<br />

Domain Working Group<br />

The group decided that option 3 was the most preferable and<br />

was the easiest to implement. This brought up the issue of<br />

zero TTLs in the DNS. RFC 1034 is somewhat ambiguous with<br />

respect to zero TTLs. However, since the meeting it has<br />

been pointed out that RFC 1035 is not ambiguous. Zero TTLs<br />

mean that an RR cannot be cached, but that it can be used<br />

for the transaction in progress, no matter how long<br />

it takes to resolve.<br />

-55-


Dynamic Host Configuration Working Group<br />

Chairpersons: Ralph Droms/UMD and Phill Gross/NRI<br />

CHARTER<br />

Description<br />

of Working Group:<br />

The purpose of this working group is the investigation of<br />

network configuration and reconfiguration management. We<br />

will determine those configuration functions that can be<br />

automated, such as <strong>Internet</strong> address assiglnment, gateway<br />

discovery and resource location, and that which cannot<br />

(i.e., those that must be managed by network<br />

administrators).<br />

Objectives:<br />

0<br />

We will identify (in the spirit of the Gateway<br />

Requirements and Host Requirements RFCs) the<br />

information required for hosts and gateways to:<br />

a) Exchange <strong>Internet</strong> packets with other hosts (e.g.~<br />

discover own <strong>Internet</strong> address)..<br />

b) Obtain packet routing information (e.g., discover<br />

local gateways).<br />

c) Access the Domain Name System (e.g., discover<br />

DNS server).<br />

d) Access other local and remote services.<br />

.<br />

o<br />

.<br />

We will summarize those mechanisms already in place for<br />

managing the information identified by objective I.<br />

We will suggest new mechanisms to manage the<br />

information identified by objective i.<br />

Having established what information and mechanisms are<br />

required for host operation, we will examine specific<br />

scenarios of dynamic host configuration and<br />

reconfiguration, and show how those scenarios can be<br />

resolved using existing or proposed management<br />

mechanisms.<br />

Estimated Timeframe for Completion:<br />

(to be determined)<br />

-57-


Dynamic Host Configuration Working Group<br />

Chairpersons: Ralph Droms/UMD and Phill Gross/NRI<br />

STATUS UPDATE<br />

i. Chairpersons: Ralph Droms, droms@sol.bucknell.edu and<br />

Phill Gross, gross@sccgate.scc.com.<br />

2. WG Mailing List: host-conf@rutgersoedu<br />

3. Last Meeting: Cocoa Beach, April 1989<br />

4. Next Meeting: Videoconference about June 12, or July IETF<br />

meeting in Palo Alto.<br />

5. Pending or New Objectives: see Charter<br />

6. Progress to Date (e.g., Documents Produced)<br />

Organizational meeting at Cocoa Beach: agreed on Charter and<br />

began discussion of Objective i.


Dynamic Host Configuration Working Group<br />

Chairpersons: Ralph Droms/UMD and Phill Gross/NRI<br />

CURRENT<br />

Reported<br />

MEETING REPORT<br />

by Ralph Droms and Phill Gross<br />

AGENDA<br />

a)<br />

b)<br />

ATTENDEES<br />

c)<br />

Discuss Charter<br />

Set date and agenda<br />

Mailing list<br />

and Objectives<br />

for next meeting<br />

Philip Almquist<br />

Dave Borman<br />

David Bridgham<br />

Farokh Deboo<br />

Ralph Droms<br />

Hunaid Engineer<br />

Bob Gilligan<br />

Phill Gross<br />

John Lekashman<br />

Norbert Leser<br />

Mark Lottor<br />

Louis Mamakos<br />

RonNatalie<br />

Bill Nowicki<br />

Drew Perkins<br />

Mike Petty<br />

Robert Reschly<br />

Carl~Herbert Rokitansky<br />

Rajeev Seth<br />

Mike St. Johns<br />

LanceTravis<br />

Bill Westfield<br />

MINUTES<br />

almquist@jessica.stanford.edu<br />

dab@cray.com<br />

’4ab@ftp.com<br />

..!sun!bridge2@fjd<br />

droms@sol.bucknell.edu<br />

hunaid@cray.com<br />

gilligan@sun.com<br />

gross@sccgate.scc.com<br />

lekash@orville.nas.nasaogov<br />

nl@osf.org<br />

mkl@sri-nic.arpa<br />

louie@trantor.umd.edu<br />

ron@rutgers.edu<br />

nowicki@sunocom<br />

ddp@andrew, cmu.edu<br />

petry@trantor.umd.edu<br />

reschly@brl.mil<br />

roki@dhafeu52.bitnet<br />

rajs%hpindbu@hp-sde.sde.hp.com<br />

stjohns@beast.ddn.mil<br />

cmt@appollo.com<br />

billw@cisco.com<br />

This meeting kicked off the Dynamic Host Configuration Working<br />

Group. The WG was formed to study the automatic management of<br />

network configuration. Phill Gross characterized the problem by<br />

referring to the TCP/IP protocol suite documents written by Chuck<br />

Hedricks. Phill pointed out the introductory document is 25<br />

pages long, while the management guide~is 48 pages long. What we<br />

hope to do in this working group is reduce the amount of hand<br />

configuration and "wizardry,, required to manage TCP/IP networks.<br />

The group began by considering the charter and a list of<br />

objectives. The charter and objectives met with general<br />

approval. The WG modified the objectives to include the writing<br />

of an RFC based on the results of Objective l, and/or more RFCs<br />

-59-


Page 2<br />

Dynamic Host Configuration Working Group<br />

based on the results of Objective 3. The WG felt that the<br />

mechanisms to be enumerated for Objective 2 represented a simple<br />

rehash of information published elsewhere, and did not warrant<br />

the publishing of a new RFC.<br />

After agreeing on the charter and the objectives, the WG dove<br />

straight into a discussion of Objective i. We quickly decided to<br />

limit the scope of our discussion to "<strong>Internet</strong> participants" with<br />

only a single interface. ~his decision allowed us to avoid the<br />

"host versus gateway" and "multi-homed host ~’ religious wars...<br />

Next, we talked about several configuration scenarios:<br />

i.<br />

2.<br />

3.<br />

4.<br />

5.<br />

Virgin host<br />

Rebooted host "<br />

Moved host<br />

Replaced host<br />

X Window System tex~inal<br />

We launched this discussion with Objective I in mind - but soon<br />

discovered that we needed to solve the "host identification"<br />

problem before we could address Objective i.<br />

We.developed the following mode], of host identification. There<br />

are several data items that might be used to identify a host:<br />

1. Interface (hardware) address<br />

2. Machine identifier (e.g., serial number)<br />

3. IP address<br />

4. Domain name<br />

In all of the scenarios we considered, identifying a host<br />

involves fixing (at least) one of the above data items and then<br />

developing the other data items from existing or new bindings.<br />

The bindings may be stored in the host, stored elsewhere in the<br />

net or assigned dynamically.<br />

For example, consider replacing a user’s broken workstation.<br />

What remains fixed is the host’s domain name, and the remaining<br />

information must be found from existing bin~dings (e.g., the<br />

Domain Name system for IP address) or existing bindings must be<br />

updated (e.g., the IP to interface address in the RARP server<br />

must be updated).<br />

Administrivia: Ro~ Natalie volunteered to manage the<br />

host-conf@rutgers.edu mailing list.<br />

¯<br />

-60-


Host Requirements Working Group<br />

Chairperson: Robert Braden/ISI<br />

CHARTER<br />

Description<br />

of Working Group:<br />

The Host Requirements Working Group has the goal of<br />

producing an RFC defining the official requirements for the<br />

software on a host which is to be part of the <strong>Internet</strong>o<br />

Specific Objectives:<br />

Produce a document that is the host equivalent of<br />

RFC-1009, "Requirements for <strong>Internet</strong> Gateways",<br />

providing guidance for vendors, implementors, and users<br />

of host software for internet applications.<br />

o Enumerate the protocols required, referencing the RFC"s<br />

and other documents describing them in detail.<br />

~ Provide further clarification, discussion, and guidance<br />

in those areas of the referenced specifications that<br />

contain ambiguous or incomplete information°<br />

e Define the current architecture as completely and<br />

carefully as possible, don’t invent new architecture.<br />

As a secondary task, provide a forum for discussing<br />

particular solutions to pressing host problems°<br />

Estimated Timeframe for Completion:<br />

Our objective is to publish the document early in 1989.<br />

-63-


Host Requirements Working Group<br />

Chairperson: Robert Braden/ISI<br />

STATUS REPORT<br />

i. Chairperson: Bob Braden, braden@isi.edu, (213) 822-1511<br />

2. WG Mailing List: let f-.hosts @NNSC. NSF. NET<br />

3. Last Meeting: Austin IETF, January 1989<br />

4. Next Meeting: Stanford IETF, July 1989<br />

5. Pending or New Objectives: see Charter<br />

6. Progress to date (e.g.~, documents produced):<br />

The document has grown to 190 pages, and a number of sets of<br />

very extensive comments have been considered and<br />

incorporated when appropriate. The decisions made at the<br />

last meeting have been incorporated, and some further<br />

changes suggested by email discussion have been made in the<br />

April 17 version, that will be installed as an<br />

<strong>Internet</strong>-Draft document.<br />

There are a few hard issues still to be resolved, and a<br />

number of areas in which further investigation would be<br />

desirable. Recent discussions ihave concerned the<br />

multihoming rules for a non-gateway host, the rules for<br />

addressing and source routing in SMTP, immediate vs.<br />

deferred processing of SMTP RCPT TO: commands,<br />

and IP source routing.<br />

The size of the document has been a cause for concern. It<br />

has been suggested that it would be better to split it into<br />

two documents, one for the application layer and support<br />

programs, and one for the transport layer and below. No<br />

decision has been taken on this.<br />

CURRENT MEETING REPORT<br />

None<br />

-64-


Interconnectivity Working Group<br />

Chairperson: Guy Almes/Rice and Scott Brim/Cornell<br />

CHARTER<br />

Description of Working Group<br />

We aim to improve practical inter-autono~mous system routing<br />

in the <strong>Internet</strong>.<br />

Specific Objectives :<br />

Produce a practical system for Inter-Autonomous System<br />

routing that is (a) significantly better than the current<br />

system based on EGP-2 and the Stub Model, and (b)<br />

significantly more timely than we expect the outcome of the<br />

Open Routing Working Group to be. We hope to produce:<br />

a Mid-Term Inter-AS Routing Architecture, and<br />

a Border Gateway Protocol both implemented and<br />

deployed.<br />

Estimated Timeframe for Completion:<br />

April 1990<br />

-65-


Interconnectiwity Working Group<br />

Chairperson: Guy Almes/Rice and Scott Brim/Cornell<br />

STATUS UPDATE<br />

i. Chairpersons: Guy Almes, almes@rice.edu<br />

Scott Brim, swb@chumley.tn.cornelloedu<br />

2. WG Mailing List(s): IWG@rice.edu<br />

3. Date of Last Meeting: April, 89 at the Cocoa Beach IETF<br />

4. Date/Site of Next Meeting: At the sunnier IETF meeting.<br />

5. Pending or New Objectives:<br />

Revision<br />

of the draft RFCs by the summer IETF meeting.<br />

6. Progress to Date (e.g., documents produced):<br />

We have draft RFCs of both the MIRA architecture<br />

protocol.<br />

and the BGP<br />

Draft RFC on MIRA and draft RFC on BGP; both internal<br />

documents at this stage.


Interconnectivity Working Group<br />

Chairperson: Guy Almes/Rice and Scott Brim/Cornell<br />

CURRENT MEETING REPORT<br />

Reported by Guy Almes<br />

AGENDA<br />

Morning session: Joint meeting with the Open Routing Working<br />

Group. Afternoon session: Closed meeting to work on problems<br />

raised that morning°<br />

ATTENDEES<br />

MINUTES<br />

Guy Almes<br />

Philip Almquist<br />

Rick Boivie<br />

Scott Brim<br />

Jeffrey Burgan<br />

Noel Chiappa<br />

Joe Choy<br />

Mike Collins<br />

Dino Farinacci<br />

Jose Garcia-Luna<br />

Elise Gerich<br />

Tony Hain<br />

Jeffrey Honig<br />

Mike Karels<br />

Steve Knight<br />

Mike Little<br />

Paul Love<br />

Marianne Lepp<br />

Charles Lynn<br />

Matt Mathis<br />

Milo Medin<br />

Don Merritt<br />

Russ Mundy<br />

Rebecca Nitzan<br />

Yakov Rekhter<br />

Milt Roselinsky<br />

Bruce J. Schofield<br />

Dallas A. Scott<br />

Mike St. Johns<br />

Paul Tsuchiya<br />

Ross Veach<br />

almes@rice.edu<br />

almquist@jessica.stanford.edu<br />

rboivie@ibm.com<br />

swb@devvax.tn.cornell,edu<br />

jeff@nsipo.nasa.gov<br />

jnc@ics.mit.edu<br />

choy @ncar.ucar.edu<br />

collins@ccc.mfecc.llnl,gov<br />

dino@bridge2.3com.com<br />

garcia@sri.com<br />

epg@merit,edu<br />

hain@ccc.mfecc.llnl.gov<br />

jch@sonne.tn.cornell.edu<br />

karels@berkeley.edu<br />

knight@cray.com<br />

little@saic~com<br />

loveep@sdsosdsc.edu<br />

mlepp@bbn.com<br />

clynn@bbn.com<br />

mathis@faraday.ece.cmu.edu<br />

medin@nsipo.nasa.gov<br />

merritt@brl.mil<br />

mundy@beast,ddn.mil<br />

nitzan@nmfecc.llnl.gov<br />

yakov@ibm.com,<br />

cmcvax!milt@hub.ucsb.edu<br />

schofield@edn-vax.dca.mil<br />

dscott@gateway.mitre.org<br />

stjohns@beast.ddn.mil<br />

tsuchiya@gateway.mitre.org<br />

rrv@uxc.cso.uiuc.edu<br />

The morning session was spent briefing the Open Routing Working<br />

Group on the Mid-Term Inter-AS Routing Architecture (MIRA) and<br />

the Border Gateway Protocol (BGP). Our assumptions about the<br />

timing of the ORWG were essentially confirmed° We presented the<br />

essential ideas of MIRA and BGP.<br />

-67-


Page 2<br />

Interconnectivity<br />

Working Group<br />

The afternoon session was spent going over remaining problems in<br />

MIRA and BGP. We spent the most time discussing the neighbor<br />

acquisition and neighbor reachability problems in the context of<br />

MIRA. A number of solutions were posed and discussed° Several<br />

work, but few have a reasonable combination of elegence and<br />

reliability.


<strong>Internet</strong> MIB Working Group<br />

Chairperson: Craig Partridge/BBN<br />

CHARTER<br />

Description<br />

of Working Group:<br />

As defined in RFC 1052, the original purpose was to devise<br />

an <strong>Internet</strong> Management Information Base (MIB) and Structure<br />

of the Management Information (SMI).<br />

Specific<br />

Objectives:<br />

After finishing version 1 of the MIB and SMI in the summer<br />

of 1988, the group continued meeting to discuss questions .of<br />

upgrading and enhancing the MIB.<br />

Estimated Timeframe for Completion:<br />

The group currently plans to release a revised <strong>Internet</strong> MIB<br />

sometime in 1989.<br />

-68-


<strong>Internet</strong> MIB Working Group<br />

Chairperson: Craig Partridge/BBN<br />

STATUS UPDATE<br />

i. Chairperson: Craig Partridge, craig@bbn, com<br />

2. WG Mailing List: mib-wg@nnsc.nsf.net~ (to joins mail to<br />

mib-wg--request@nnsc., ns f. net)<br />

3. Last Meeting: Austin, TX, January 1989<br />

4. Next Meeting: May 18th in Boston where it will consider a<br />

draft for a second version of the MIB. ~<br />

5. Pending or New Objectives: see Charter<br />

6. Progress to Date (e.g., documents produced):<br />

CURRENT MEETING REPORT<br />

none


JOMANN Working Group<br />

Chairperson: Susan Hares/MERIT<br />

CHARTER<br />

Description<br />

of Working Group:<br />

This "Joint Monitoring Access for Adjacent Networks focusing<br />

on the NSFNET Community" Working Group will:<br />

discuss how to.identify problems in the next hop<br />

network<br />

create a list of existing tools which can solve these<br />

problems (We will discuss to see if NOC-Tools Working<br />

Group can take over this. NSFNET will archive a list<br />

of these tools.)<br />

create a list of routing topology maps of regionals<br />

(possibly prepare a MAP <strong>Internet</strong>-Draft)<br />

Specific Objectives :<br />

See above<br />

Estimated Timeframe for Completion:<br />

6-9 months (August 31, 1989)<br />

-70-


JOMANN Working Group<br />

Chairperson: Susan Hares/MERIT<br />

STATUS UPDATE<br />

Chairperson: Susan Hares (Merit), skh@merit.edu<br />

©<br />

WG Mailing List: njm@merit.edu (Regional or National Net<br />

NOC people)<br />

njm-interest@meritoedu (anyone interested)<br />

njm-request@merit.edu<br />

3. Date of Last Meeting: Cocoa Beach, April 11-14, 1989<br />

4. Date of Next Meeting: Stanford~ July 2.5-26, 1989<br />

o<br />

Pending or New Objectives: to be detez~ined<br />

o<br />

Progress to Date (e.g., documents<br />

prod~[ced):<br />

Common SNMP monitor session<br />

Policies discussed; agreement on error reporting,<br />

outage reporting, and virus reporting<br />

MAPs collected<br />

Tools list - no progress. Possible project for NOC-<br />

Tools WG<br />

WHO SHOULD ATTEND:<br />

Technical representatives from mid-level or peer networks. In<br />

the future we may want to extend this to technical represen-<br />

~tatives from campus networks. However, in interest of getting a<br />

lot of work done quickly the initial working group will be<br />

limited.


JOMANN Working Group<br />

Chairperson: Susan Hares/MERIT<br />

CURRENT MEETING REPORT<br />

(Chaired by Elise Gerich in the absence of Susan Hares)<br />

Reported by Elise Gerich/MERIT<br />

AGENDA<br />

Io SNMP Community Names<br />

2. Traffic Statistics Request<br />

3. ARPANET<br />

SNMP Community<br />

Names<br />

The discussion centered around the distribution and changing of<br />

the global SNMP community names.<br />

It was mentioned that there should be a policy for<br />

distribution along with the name.<br />

Merit asked if anyone minded changing the name° All parties,<br />

except for NYSERNet, did not feel strongly about the periodic<br />

changes of the SNMP community name. It was felt that this<br />

was not needed.<br />

A vote was taken and by majority (not unanimously), it was<br />

decided to not change the SNMP community name at a constant<br />

interval. The name will stay the Same until further notice°<br />

As a side note, it was mentioned that MERIT/IBM now has SNMP<br />

deployed in the backbone and is giving out the community name<br />

to any regional who wants to interoperability test. There has<br />

been very little interoperability testing as of the time of the<br />

meeting. Anyone who was interested in testing-the implementation<br />

was asked to talk with Elise after the meeting’.<br />

Mark Oros’s Questions<br />

There were some questions for the group posed by Mark Oros.<br />

These were discussed. As follows:<br />

How many people use SNMP/SGMP?<br />

Almost all of the regionals currently use it or are in the<br />

process of installing it.<br />

-72-


Page 2<br />

JOMANN Working<br />

Group<br />

Vendor specific<br />

traps:<br />

Mark proposed that it would be useful to have a Vendor<br />

Specific S~MP trap for the Proteon Gateway which would<br />

be used to indicate someone logging into the gateway.<br />

When someone successfully logged into the gateway, the<br />

Proteon would generate a trap.<br />

After some discussion, the group felt that this was a<br />

good idea. Proteon will be notified and it was suggested<br />

that all concerned parties .call tlheir friendly Proteon<br />

sales rep.<br />

Traffic Statistics Request<br />

Merit has asked the regionals to provide them with traffic<br />

statistics/data on the tralffic flowing from the regional<br />

into NSFNET. For example, the amount of packets/bytes<br />

sent from the regional to the NSS.<br />

Ideally Merit would like:<br />

Packet Size Distribution<br />

Distribution of traffic<br />

Packets<br />

Bytes<br />

If you don’t have the data,then you obviou~sly cannot provide<br />

it. The time-frames Merit would like to see include:<br />

24 hours, weekly, hourly. Raw data is also preferred.<br />

In summary, Merit will take whatever you have in terms of data<br />

collected and reports generated.<br />

ARPANET<br />

PSCNET is now the primary route to ARPANET. Much thanks<br />

to Matt Mathis and others for dealing with this at the<br />

spur of the moment.<br />

There is a planned NSFNET connection to ~the MILNET at univ.<br />

of Maryland. There is also a connection to the MILNET planned<br />

at NASA AMES.<br />

FUTURE OF JOMANN<br />

This topic was left up to the mailing<br />

discussion is planned.<br />

list. An E-mail<br />

-73-


Lan Manager Working Group<br />

Chairperson: Amatzia Ben-Artzi/3Com<br />

CHARTER<br />

Description<br />

of Working Group:<br />

To define the MIB (and relevant related mechanisms) needed<br />

to allow managementoverlap between the workgroup<br />

environment (LAN Manager based) and the enterprise<br />

environment (based on TCP/IP management).<br />

Specific Objectives:<br />

This translates<br />

into four basic areas:<br />

Define a set of management information out of the<br />

existing LAN Manager objects to allow for useful<br />

management from a TCP/IP based manager.<br />

Define extensions to the TCP/SMI when appropriate.<br />

Develop requirements for additional network management<br />

information, as needed, and work to extend the LAN<br />

Manager interfaces to support such information°<br />

Define the mechanisms of exchange of management<br />

information between clients and se~rers so that proxies<br />

can be developed.<br />

Estimated Timeframe for Completion:<br />

-74-


LAN Manager Working Group<br />

Chairperson: Amatzia Ben-Artzi/3Com<br />

STATUS UPDATE<br />

i. Chairperson: Amatzia Ben-Artzi~ amatzia@spdo3mail.3comocom<br />

2. WG Mailing List: lanmanwg@spam, istc.sriocom<br />

3. Date of Last Meeting: Cocoa Beach April 1989<br />

4. Date of Next Meeting: May 1989<br />

5. Pending or New Objectives: to be defined<br />

6. Progress to Date (e.g., documents produced):<br />

o Draft Proposal. for MIB Objects<br />

o Discussed 2nd draft at the meeting<br />

o Working on 3rd draft. To be posted in mailing list<br />

this week. Hope to bring it before the "large" MIB-WG<br />

at their 5/18 meeting.


LAN Manager Working Group<br />

Chairperson: Amatzia Ben-Artzi/3Com<br />

CURRENT<br />

Reported<br />

MEETING REPORTS<br />

by Amatzia Ben-Artzi<br />

FEBRUARY INTERIM MEETING<br />

The Lan Manager MIB working group met Wednesday, 2/22 in<br />

Sunnyvale, CA for our first meeting. The meeting was very<br />

productive and generated a long list of output and action<br />

items. Below is a summery of the meeting and major decisions<br />

reached.<br />

The minutes cover seven topics:<br />

I. Introduction<br />

2. The Group’s Objectives<br />

3o To Proxy or Not?<br />

4. Initial Documents and Editors<br />

5. Relationship to the MIB WG<br />

6. Mailing List<br />

7. Timetable<br />

Introduction<br />

to the Lan Manager.<br />

Amatzia gave a short introduction on the Lan Manager. The<br />

emphasis is on the management interoperability issues<br />

between the Lan Manager as a standard in the workgroup<br />

environment and the standards being developed in the<br />

"enterprise" environment. As both are based on the TCP/IP<br />

it is important that they can cooperate. Microsoft offered<br />

to provide a more extensive overview of the LanManager if<br />

people will find it useful. Please send me feedback on this<br />

one!!<br />

Group’ s Objective<br />

The objective of the group is to define the MIB (and<br />

relevant related mechanisms) needed to allow management<br />

overlap between the workgroup environment (Lan Manager<br />

based) and the enterprise environment (based on TCP/IP<br />

management).<br />

We found that it translated<br />

into four basic areas:<br />

Define a set of management information out of the<br />

existing Lan Manager objects to allow for useful<br />

management from a TCP/IP based manager.<br />

Define extensions to the TCP/SMI where appropriate.<br />

-76-


Page 2<br />

LAN Manager<br />

Working Group<br />

3. Proxy or Not?<br />

Develop requirements for additional network management<br />

information, as needed~ and work to extend the Lan<br />

Manager interfaces to support such information.<br />

Define the mechanisms of exchange of management<br />

information between clients and servers so that proxies<br />

can be developed.<br />

We concluded that the manager need to have access to the<br />

management information in every client in a direct way. It<br />

amounts to the following:<br />

- A client may haw~ a Management/TCP stack.<br />

A client may be supported by a se~er that acts as<br />

"proxy" on his behalf.<br />

The manager<br />

techniques<br />

need not be aware of which one of the<br />

above is being used in the workgroup.<br />

However, we recognized that in the proxy mode, the server<br />

may have two types of objects: server resident, and client<br />

resident. For the second type, a server-client mechanism has<br />

to be developed to allow the implementation of a proxy.<br />

4o Initial Documents and Editors<br />

The following documents have been identified as needed.<br />

Initial editors were also selected.<br />

- SMI Extensions: Pranati Kapadia, HP<br />

- MIB Objects: Jim Greuel, HP<br />

- NDIS Extensions (not assigned)<br />

- Transport APIs for NM Information access (notassigned)<br />

- Client-Server management protocol<br />

5. Relationship to the MIB group<br />

A real objective of this MIB group is to work under the<br />

"BIG" MIB group. One implication was that the MIB<br />

specification should follow the 1066 RFC,(specifying all<br />

attributes as "objects") with an appendix that actually<br />

describe the containment relationship (Same technique that<br />

was used in the CMOT RFC to re-state t~ne supported MIB)<br />

-77-


Page 3<br />

LAN Manager<br />

Working Group<br />

A big question mark is SMI. Can we live with the guideline<br />

of "no SMI extensions" ? We shall address it when the first<br />

required extension shows. We do know, however, that EVENTS<br />

or alerts, or alarms) are a big issue, but we where not sure<br />

if this was an SMI issue or what.<br />

We also feel very strongly that the recommendation of the<br />

previous MIB group should be followed: Lan Manager should be<br />

assigned a number of the MIB (Like TCP~ liP, or CMOT) and<br />

define it objects under this branch. Then, bring them<br />

forward to the larger group for discussion and approval.<br />

ONLY EXPERIMENTAL OBJECTS SHOULD BE PLACED UNDER THE<br />

EXPERIMENTAL BRANCH.<br />

The whole branch is OPTIONAL, so people who don’t implement<br />

it do not have to worry about conformance. It seems like we<br />

would want, for simplicity of conformance, at least<br />

initially, to say: the branch is optional, but if you<br />

implement it, it is ALL mandatory. The target is roughly<br />

20 - 30 objects initially.<br />

o<br />

Mailing list:<br />

Welcome a new mailing list: LanManWG@spam. istc.sri.com<br />

As usual, there is also a LanManWG-request.<br />

Initial membership:<br />

o<br />

aguilar@istc.sriocom<br />

jimg@hpcnd.hp.com<br />

-.-!ucbvax!mtxinu!excelan!ramesh<br />

...microsoft!henrysa<br />

geo@ub.com<br />

kapadia@hpda.hp.com<br />

davep@esd.3com.com<br />

jcham@mbunix.mitre.org<br />

Hunter@nmfecc.arpa<br />

--.!ucbvax!mtxinu!excelan!pramod<br />

jonab@cam.unisys.com<br />

kzm@twg.com<br />

amatzia@spd.3com.com<br />

Timetable<br />

SRI<br />

H-P<br />

Excelan<br />

Microsoft<br />

Ungerman-Bass<br />

H-P<br />

3Com<br />

Mitre<br />

Laurence Livermore Lab<br />

Excellan<br />

Unisys<br />

The Wollongong Group<br />

3Com<br />

March 17: First draft proposal for MIB objects in the mail.<br />

March 31: Comments are due back to the editor<br />

April 11-14: IETF meeting. We shall meet sometime there to<br />

discuss the proposed draft (currently planned as a half-day<br />

meeting)<br />

Thanks to all the participants for a very effective meeting.<br />

-78-


Page 4<br />

LAN Manager<br />

Working Group<br />

APRIL IETF MEETING<br />

ATTENDEES<br />

Amatzia Ben-Artzi<br />

Jeff Case<br />

Jim Greuel<br />

Steven Hunter<br />

Lee LaBarre<br />

Rajevv Seth<br />

Jim Sheridan<br />

Louis Steinberg<br />

amatzia@~spd.3+.3com.com<br />

case@utksxl.utk.edu<br />

jimg%hpcndpc@hplabs.hp.com<br />

hunter@ccc.mfecc.llnl.gov<br />

cel@mbunix.mitre.org<br />

rajs%hpilndbu@hplabs.hp.com<br />

jsherida@ibm.com<br />

louiss@ilbm.com<br />

MINUTES<br />

Key actions/directions:<br />

Group agreed that lanman-mib should be part of the standard<br />

mib version 2.<br />

Events will be introduced on a limited basis and enter as<br />

"experimental" to "the MIB.<br />

Experimental events should have examples in the standard how<br />

they fit into CMOT and SNMP.<br />

The event "thresholds" (i.e., boundery conditions) should<br />

defined as standard objects using the standard SMI (RFC<br />

1065). They will, however, be defined in tables to preserve<br />

their internal dependency/relation.<br />

Next activities:<br />

Review 3rd draft over the mailing list.<br />

Present to MIB-WG at 5/18.<br />

Next meeting to finalize the RFC or start the next phase<br />

[depending on progress with the MIB-WG] at IETF meeting in<br />

July.<br />

-79-


-82-


NISI Working Group<br />

Chairpersons: Karen Bowers/NRI and Phill Gross/NRI<br />

CHARTER<br />

Description<br />

of Working Group:<br />

The NISI WG will explore the requirements for common, shared<br />

internet-wide network information services. The goal is to<br />

develop an understanding for what is required to implement<br />

an information services "infrastructure" for the <strong>Internet</strong>.<br />

This effort will be a sub-group of the User Services WG and<br />

will coordinate closely with other IAB and FRICC efforts in<br />

the area of Directory Services. ~<br />

Specific Obj ectives :<br />

1) Write a short white paper to serve as a starting point<br />

for discussions on an <strong>Internet</strong>-wide information<br />

services infrastructure.<br />

2) Develop a more detailed statement of required<br />

information services as currently supplied by a typical<br />

network information service organization. This will<br />

initially take the form of an annotated outline of<br />

services, suitable to be expanded into a full<br />

Requirements Document.<br />

3) Define candidate pilot projects for consideration by<br />

this or other groups to implement. Initial candidates<br />

include:<br />

- Define common user interface for information<br />

retrieval by electronic mail.<br />

- Define common user interfaces for other information<br />

services (e.g., white pages)<br />

- Define the minimally required infoz~ation content<br />

for an <strong>Internet</strong>-wide use registration database and<br />

begin to collect such information.<br />

Estimated Timeframe for Completion:<br />

Objective 1 -- Draft to be distributed by email to the<br />

USWG mailing list by June 30, 1989.<br />

Objective 2 -- Annotated outline, ready for volunteer<br />

writing assignments, to be distributed by email to the<br />

USWG and the NISI mailing lists by June 30, 1989<br />

Objective<br />

3 -- To be determined


NISI Working Group<br />

Chairpersons: Karen Bowers/NRI and ]?hill Gross/NRI<br />

STATUS UPDATE<br />

I® Chairpersons: Karen ]3. Bowers / bowers@sccgate.scc.com<br />

Phill Gross / gross@sccgate.scc.com<br />

2. WG mailing list: NISItMERI...EDU<br />

3. Date of Last Meeting: 04 May 89 / NRI<br />

o Date of Next Meeting: 25-28 Jul 89 / Stanford IETF ~<br />

¯<br />

Pending Objectives:<br />

Two Immediate Actions: Network Information Services<br />

Requirements Document<br />

White Paper: Network Information<br />

Services Infrastructure (NISI)<br />

Both drafts to be distributed prior to the July IETF<br />

Meeting. These drafts will be further expanded/edited by<br />

the NISI WG and then presented to the full body of the USWG<br />

for review.<br />

6. Progress to Date (e.g., documents produced):<br />

First Meeting<br />

Held<br />

-85-


NISI Working Group<br />

Chairpersons: Karen Bowers/NRI and Phill Gross/NRI<br />

CURRENT MEETING REPORT<br />

Reported by Karen Bowers and Phill Gross<br />

AGENDA<br />

- Individual Information Services Briefings<br />

* NSFnet, NIS (MERIT) - Jim Sweeton<br />

* NSFnet, NNSC (BBN) - Craig Partridge<br />

* CSNET, CIC (UCAR) - Laura Breeden<br />

* BITNET, BITNIC (EDUCOM/BITNET) Ji m Co nklin<br />

* DDN, NIC (SRI) - Mary Stahl<br />

* PREPnet (PA Research and Economic Partnership)<br />

Thomas Bajzek<br />

- Strategy for Preparation of the Network Information<br />

Services Requirements Document : purpose of document,<br />

how best to prepare<br />

- Discuss Related Projects: IAB White Pages Workshop<br />

FRICC DECNET/<strong>Internet</strong> Directory<br />

Services (Phill Gross)<br />

- Discuss/Modify Strawman Agenda:<br />

* Pilot Project Selection<br />

* Technical Approach to be Employed<br />

Explore Methods for Providing Selected Services<br />

Define Support Requirements<br />

Define the Common, Shared User-Interface<br />

Define Applications to Interface Current <strong>Internet</strong><br />

Services<br />

* Follow-on Activities<br />

How to Implement<br />

Issues for an <strong>Internet</strong>-wide Information Services<br />

Infrastructure (NISI)<br />

- Determine Critical Actions to be Undertaken Immediately<br />

by the NISI WG<br />

ATTENDEES:.. Thomas Bajzek (PREPNET), Karen L. Bowers (NRI),<br />

Laura Breeden (CSNET), Jim Conklin (BITNET), Jose Garcia-Luna<br />

(DDN/SRI), Phill Gross (NRI), Craig Partridge (NNSC/BBN)<br />

Mike Roberts (EDUCOM), Mary Stahl (DDN/SRI), Jim Sweeton<br />

(NSI/MERIT). Participants unable to attend this session but<br />

who have been invited to join this closed forum are:<br />

Waverly Williams (SPAN) and Karen Roubicek (NNSC/BBN)<br />

(FARNET representation was provided by both Laura Breeden and<br />

Thomas Bajzek. Guy Almes was unable to attend.)<br />

-86-


Page 2<br />

NISI Working<br />

Group<br />

MINUTES<br />

The Network Information Services Infrastructure (NISI)<br />

held its first meeting on May 4, 1989, 12:00pm - 5:45pm<br />

at the Corporation for National Research Initiatives,<br />

Reston, VA.<br />

The goal of this meeting was to explore the technical and nontechnical<br />

issues of providing common, shared <strong>Internet</strong>-wide<br />

information services.<br />

As a basis for understanding the current, general information<br />

services requirements of t]~e <strong>Internet</strong> community, each attendee<br />

who currently is responsible for providing network information<br />

services was asked to provide a short presentation summarizing<br />

the type and guality of services they provide, and the services<br />

they see a need for but currently do not provide. This exercise<br />

enabled the WG to develop a baseline of what types of services<br />

exist, overlap and differ, how those services are implemented,<br />

and the value-added services for which there could be a future<br />

demand. This information will be assembled into a "Network<br />

Information Services Requirements Document" by the NISI WG and<br />

presented to the body of the USWG for review and comment.<br />

Phill Gross provided an update on the results of Dave Clark’s<br />

Workshop on <strong>Internet</strong> White Pages. Last week a draft Plan for<br />

<strong>Internet</strong> Directory Services was released by Karen Sollins to<br />

all the workshop participants for comment/review. It is purported<br />

this document will be released shortly to the public, at which<br />

time it will be available to the NISI WG. In summary, X.500 was<br />

identified as the most likely candidate for directory service.<br />

However, the consensus of the workshop is to propose a field<br />

trial(s).to include experiments with at least an X.500<br />

implementation, Profile to explore a non-hierarchical structure<br />

and possibly DECnet’s Network Architecture Naming Service<br />

(DNANS). Another related directory services project<br />

underway is the current indepth examination of DECnet’s<br />

Network Architecture Naming Service (DNANS) by the FRICC,<br />

anticipation of implementing this service in the large scale<br />

DECnet <strong>Internet</strong>. This will be an important issue in the<br />

upcoming transition from DECnet Phase IV to DECnet Phase V.<br />

A discussion of the short and mid-term agenda for the NISI<br />

WG ensued. The WG members decided on two immediate actions:<br />

i) to write a Network Information Services Requirements Document<br />

that identifies information sez~ices currently available,<br />

those that overlap and differ, value-added services that are<br />

or should be made available, and how these services are<br />

currently implemented. In addition, this document could<br />

include "lessons learned" on how to better provide these<br />

services.


Page 3<br />

NISI Working Group<br />

2) to prepare a white paper defining the concept of a Network<br />

Information Services Infrastructure, to be made available as a<br />

reference document for any organization proposing/developing a<br />

new or follow on network information service or network<br />

information service infrastructure effort.<br />

Actions for follow-on meetings include:<br />

Explore the preliminary steps in developing a Common User<br />

Interface(s) for email information services and for white<br />

pages and determine if these are pilot projects the USWG<br />

should undertake. Perhaps at a. minimum, the NISI WG could<br />

"define" what those Common User Interfaces should be.<br />

Examine the requirements for and issues associated with<br />

common/standard User Registration Database Attributes and<br />

accomplish a draft definition of those attributes. An<br />

associated task would be to define tools for database<br />

management as well.<br />

Coordinate with the FRICC/IAB on our mutual concerns and<br />

related activities.<br />

The next meeting will be in Stanford, 25-28 July 1989.<br />

In the interim, initial drafts of the NIS Re~lirements Document<br />

and the NISI white paper will be prepared by Phill Gross<br />

and Karen Bowers and provided by email to the NISI WG members<br />

for their reciprocal input prior to the July IETF meeting.<br />

-88-


Network Management Services Interface Working Group<br />

Chairpersons: Jeff Case/UTK and Keith McCloghrie/TWG<br />

CHARTER<br />

Description<br />

of Working Group:<br />

The objective of the Network Management Services Interface<br />

Working Group is to define a management services interface<br />

by which network management applications may obtain access<br />

to a heterogeneous, multi-vendor, multi-proto~ol set of<br />

network manageable devices. While such an interface is<br />

desirable, the extent to which an implementation is feasible<br />

in real systems, is not clear.<br />

The services interface is intended to support the network<br />

management protocols and strategies commonly found in<br />

networking devices today. As this is an <strong>Internet</strong><br />

<strong>Engineering</strong> <strong>Task</strong> <strong>Force</strong> Working Group, the natural focus is<br />

on current and future network management strategies used in<br />

the <strong>Internet</strong>. However, the interface being defined is<br />

expected to be sufficiently flexible and extensible to also<br />

allow support for other protocols, at little or no extra<br />

cost. The anticipated list of supported strategies and<br />

protocols includes: the standard TCP/IP network management<br />

protocol, i.e., the Simple Network ManagementProtocol<br />

(SNMP); the standard OSI network management protocol, i.e.,<br />

the Common Management Information Protocol (CMIP) ;<br />

experimental TCP/IP network management protocol, i.e.,<br />

Common Management Information Protocol over TCP/IP (CMOT);<br />

the Manufacturing Automation Protocol and Technical Office<br />

Protocol (MAP/TOP); as well as proprietary network<br />

management protocols.<br />

Specific Objectives:<br />

l)<br />

2)<br />

3)<br />

~)<br />

define an architectural framework for such a service<br />

interface,<br />

advance an RFC which describes the interface,<br />

implement one or more prototypes~ and<br />

evaluate the viability of the interface including<br />

recommendations for future work and the feasibility of<br />

implementation in real systems°<br />

Estimated Timeframe for Completion:<br />

Not known at this time<br />

-90-


Network Management Services Interface Working Group<br />

Chairperson: Jeff Case/UTK and Keith McCloghrie/TWG<br />

STATUS UPDATE<br />

1 o Chairpersons : Jeff Case, case@UTKUXl. UTK. EDU<br />

Keith McCloghrie, kzm@TWGo COM<br />

2. WG Mailing List(s): none implemented at this time<br />

3. Date of Last Meeting: Cocoa Beach, FL April ii, 1989<br />

4. Date of Next Meeting:<br />

May 15-17, 1989 in conjunction with the Boston IFIPS<br />

conference<br />

(Editor’s note: this meeting will be postponed because<br />

expected contributions have. not been received as expected. )<br />

¯<br />

Pending<br />

or New Objectives:<br />

No changes in objectives resulted from this meeting.<br />

0<br />

Progress to Date (e.g., documents produced):<br />

o Initial meeting held. We are working through the<br />

process. Revisons to the initial draft document are<br />

underway.<br />

o There is a draft document which was discussed in the<br />

meeting. Revisions to the draft are underway.<br />

-91-


Network Management Services Interface Working Group<br />

Chairpersons: Jeff Case/UTK and Keith McCloghrie/TWG<br />

CURRENT MEETING REPORT:<br />

Reported by Jeff Case and Keith McCloghrie<br />

AGENDA<br />

Ist Meeting<br />

Introductions, registration, etc (15 min) KZM<br />

Introduction to the problem and work in progress (45 min) JDC<br />

Discussion of the draft RFC (60 min) JDC<br />

Brainstorm about architecture required (45 min) KZM<br />

Organizational details: mtgs, mailing list, etc. (30 min) KZM<br />

ATTENDEES<br />

Momhammad Alaghebandan<br />

Cathy Aronson<br />

David Bridgham<br />

Jeff Case<br />

John Chao<br />

Danny Cohen<br />

John Cook<br />

Hunaid Engineer<br />

Lionel Geretz<br />

Jim Greuel<br />

Brian Handspicker<br />

Steven Hunter<br />

MarkKepke<br />

Lee LaBarre<br />

Norbert Leser<br />

Paul Love<br />

Keith McCloghrie<br />

Bill Norton<br />

Rajeev Seth<br />

Jim Sheridan<br />

Lance Travis<br />

Steve Waldbusser<br />

Dan Wintringham<br />

mra@bridge2.3com.com<br />

cja@merit.edu<br />

dab@ftp.com<br />

case@utkuxloutk.edu<br />

jchao@bbn.com<br />

cohen@isi.edu<br />

cook@chipcom.com<br />

hunaid@cray.com<br />

lionel@salt.acc.com<br />

jimg%hpcndpc@hplabs.hp.com<br />

bd@vines.dec.com<br />

hunter@ccc.mfecc.llnl.gov<br />

mak%hpcndm@hplabs.hp.com<br />

cel@mbunix.mitre.org<br />

nl@osf.org<br />

loveep@sds.sdsc.edu<br />

kzm@twg.com<br />

wbn@merit.edu<br />

rajs%hpindbu@hp-sdeosde.hp.com<br />

jsherida@ibm.com<br />

cmt@apollo.com<br />

sw01@andrew.cmuoedu<br />

danw@igloo.osc.edu<br />

MINUTES<br />

An initial meeting of the Working group was held on April ii at<br />

the Cocoa Beach IETF meeting. Jeff Case presented the problem<br />

and explained the work that had taken place before the meeting.<br />

A draft document was distributed and discussed. Several<br />

individual volunteered to prepare and forward alternate text for<br />

sections of the document before May 1 so that a new draft can be<br />

prepared and distributed before the next meeting. It was agreed<br />

to attempt to meet in Boston sometime between May 15-17 in<br />

conjunction with the IFIPS network management conference and the<br />

MIB working group meeting. (Editor’s note: however, since<br />

expected contributions to the draft document have not<br />

materialized in a timely fashion, this meeting will be<br />

postponed.)<br />

-92-


NOC-Tools Working Group<br />

Chairperson: Robert Enger/Contel<br />

CHARTER<br />

Description<br />

of Working Group:<br />

The NOC-Tools Working Group will develop a catalog to assist<br />

network managers in the selection and acquisition of<br />

diagnostic and analytic tools for TCP/IP <strong>Internet</strong>s.<br />

Specific Objectives :<br />

Identify tools available to assist network managers in<br />

debugging and maintaining their networks.<br />

o<br />

o<br />

o<br />

o<br />

Publish a reference document listing what tools are<br />

available, what they do, and where they can be<br />

obtained.<br />

Arrange for the central (or multi-point) archiving<br />

these tools in order to increase their availability.<br />

Establish procedures to ensure the ongoing maintenance<br />

of the reference and the archive, and identify an<br />

organization willing to do it.<br />

Identify the need for new or improved tools as may<br />

become apparent during the compilation of the reference<br />

document.<br />

Estimated Timeframe for Completion:<br />

The first edition of the catalog will be submitted for final<br />

review at the October-November IETF meeting. Preliminary<br />

versions will be made available earlier.<br />

-94-


NOC- Tools Working Group<br />

Chairperson: Robert Enger/Contel<br />

STATUS UPDATE<br />

Io Chairperson: Robert Enger, enger@sccgate.sccocom<br />

2. WG Mailing List: noc~ools@merit.edu<br />

3. Date of Last Meeting: Cocoa Beach, April 12, 1989<br />

4. Date of Next Meeting: Stanford, July 25-28 1989<br />

5. Pending or New Objectives: Final review of the catalog<br />

planned, for Octobe]~November IETF Meeting.<br />

6. Progress to Date (e.g., documents produced):<br />

Preliminary catalog outling and entry format have been<br />

developed. First pass made at enumerating the t°ools<br />

available.


NOC-Tools Working Group<br />

Chairperson: Robert Enger/Contel<br />

CURRENT MEETING REPORT<br />

Reported by Robert Enger<br />

ATTENDEES<br />

MINUTES<br />

Mohammad Alaghebandan<br />

Cathy Aronson<br />

Jeff Case<br />

John Chao<br />

John Cook<br />

Robert Enger<br />

Hunaid Engineer<br />

Mark Fedor<br />

Steven Hunter<br />

Gary Malkin<br />

Don Morris<br />

Bill Norton<br />

Joel Replogle<br />

Joyce Reynolds<br />

Karen Roubicek<br />

John Scott<br />

Rajeev Seth<br />

Jim Sheridan<br />

Mary Stahl<br />

Bob Stine<br />

Steve Waldbusser<br />

Bill Westfield<br />

Dan Wintringham<br />

mra@bridge2.3com.com<br />

cja@merit.edu<br />

case@utkuxl.utk.edu<br />

jcha@bbn.com<br />

cook@chipcom.com<br />

enger@sccgate.scc~com<br />

hunaid@cray.com<br />

fedor@nisc.nyser.net<br />

hunter@ccc.mfecc.llnlogov<br />

gmalkin@proteon.com<br />

morris@ncar.ucar.edu<br />

wbn@meritoedu<br />

jr@ncsa.uiuc.edu<br />

jkrey@venera.isi.edu<br />

roubicek@nnsc.nsfonet<br />

scott@dg-rtp.dg.com<br />

rajsohplndbu@hp-sde.sde.hp.com<br />

jsherida@ibm.com<br />

stahl@sri-nic.arpa<br />

quest@edn-unix.dcaomil<br />

sw01@andrew, cmuoedu<br />

billw@cisco.com<br />

danw@igloo.osc.edu<br />

The kick-off meeting was quite productive, and was a good start<br />

to meeting our group’s goal of producing a document and<br />

disbanding by December of this year.<br />

We began the meeting by reviewing the charter of the Noctools<br />

Working Group. Briefly, the purpose of the Noctools Working<br />

Group is to produce the first edition of a catalog of network<br />

management tools for TCP/IP inte;nets, and to identify one or<br />

more sites to serve as tool and catalog repositories.<br />

Incredibly, we have already received volunteers for catalog and<br />

tool repositories: Phil Almquist, of Stanford, and Mark Fedor, of<br />

Nysernet, each volunteered his own site.<br />

We then discussed the proposed structure of the tool catalog.<br />

The bulk of the document will be an alphabetic list of network<br />

management tools. The list of entries will be preceded by an<br />

intro describing the catlog’s purpose and structure, and an index<br />

into the catlog. The index will group tools according to<br />

function or category; some tools will be listed in several<br />

functional groups. Developing a workable taxonomy is important<br />

-96-


Page 2<br />

NOC-Tools Working Group<br />

for indexing the tool catalog. Our goal is to allow the<br />

document’s readers to quickly locate the tools that will meet<br />

their needs.<br />

The need for a useful index was the motivation for a discussion<br />

on a taxonomy of network management tools. There was little<br />

consensus, other than that the "IEEE Five" (performance, fault,<br />

configuration, accounting, and security management) do not<br />

constitute a very useful taxonomy. From floor came the sound.<br />

point that attempting to categorize at this stage is premature;<br />

we need to examine our data before attemptilng-to describe them.<br />

We decided to defer the development of a taxonomy until we had<br />

the opportunity to review some number of entries.<br />

We also discussed the scope of the catalog. In summary, even<br />

though we are cataloging tools for internet management, some LAN<br />

management tools and tools that run only under certain operating<br />

systems or hardware configurations are potentially eligible for<br />

inclusion in the catalog. We did not, nor do we need to, develop<br />

criteria for differentiating internet management tools from other<br />

management tools. There was~ however, consensus that breakout<br />

boxes will not be included in the catalog.<br />

As a basis for discussion, we developed a quick list of internet<br />

tools that probably will be included[:<br />

arp<br />

ding<br />

etherfind<br />

internet rover<br />

lan analyzer<br />

mconnect<br />

netspy<br />

netspy<br />

netwatch<br />

nnstat<br />

nslookup<br />

nysernet snmp tools<br />

overview<br />

ping(s)<br />

sniffer<br />

tcpdump<br />

tcptrace<br />

tokenview<br />

xnetmon<br />

xup<br />

After enumerating the tools, we then discussed the scope and<br />

format of individual tool descriptions. To avoid unfairness to<br />

products and legal battles with their vendors, descriptions will<br />

-97-


Page 3<br />

NOC-Tools Working Group<br />

be strictly objective. We agreed on a working format for the<br />

tool entries; each entry will have the following sections, with<br />

no more than a few paragraphs for each:<br />

¯<br />

¯<br />

¯<br />

¯<br />

i0.<br />

Tool name.<br />

Key word list: for now, a best guess. We will have a<br />

uniform key-word list in the final catalog.<br />

Abstract: a brief description of the tool’s purpose and<br />

characteristics.<br />

Mechanism: how the tool works.<br />

Caveats: cautions about tool impact on system performance,<br />

etc. "<br />

Hardware requirements.<br />

Software requirements.<br />

Related analysis tools: post processors, data reduction<br />

tools, etc.<br />

~vailability/Support: How to obtain the tool, and whether<br />

is public domain, copyrighted, or commercially available.<br />

it<br />

This will NOT include pricing information.<br />

Bugs/limitations.<br />

The issue of accepting vendor inputs for the catlog came up. Our<br />

consensus was that we will welcome vendor submissions, though the<br />

Noctools Working Group will retain editorial control over the<br />

catalog.<br />

>From the floor came the excellent suggestion to establish a<br />

review panel. This would provide some anonymity to reviewers,<br />

and could insulate them from vendor pressure.<br />

Towards the meeting’s end, we solicited volunteers to write draft<br />

entries for the tools we had listed. For now, entries will be<br />

submitted in ASCII, to the mailing list. As entries are<br />

collected, the draft of the tool catalog will reside in the ietf<br />

drafts directory.<br />

In other business, co-chairmen Bob Stine and Bob Enger were<br />

tasked to develop a tool-use survey and forward it to NOCs,<br />

mailing lists, trade magazines, and a few of the internet old<br />

boys. Phill Gross was tasked to inform Jon Postel of our group’s<br />

activities.<br />

A mailing list, noctools@merit.edu, has been established for the<br />

working group. As usual, requests to join the list should be<br />

directed to noctools-request@merit.edu.<br />

-98-


-i00-


Open SPF-based IGP Working Group<br />

Chairpersons: Mike Petry/UMD and John Moy/Proteon<br />

CHARTER<br />

Description<br />

of Working Group:<br />

The 0SPF working group will develop and field test an<br />

SPF-based Internal Gateway Protocol. The specification will<br />

be published and written in such a way so as to encourage<br />

muliple vendor implementations.<br />

Specific Objectives:<br />

lo Design the routing protocol, and write its<br />

specification.<br />

¯ Develop multiple implementations, and test against each<br />

other.<br />

3. Obtain performance data for the protocol.<br />

4. Make changes to the specification (if necessary) and<br />

publish the protocol as an RFCo<br />

Estimated Timeframe for Completion:<br />

We have a complete protocol specification. Implementation<br />

experience and performance data should be obtained during<br />

the summer of 1989. The specification should be ready for<br />

final review by the October-November IETIFo<br />

-102-


Open SPF-based IGP Working Group<br />

Chairpersons: Mike Petry/~/MD and John Moy/Proteon<br />

STATUS UPDATE<br />

I. Chairpersons: Mike Petry, petry@trantor.umdoedu<br />

John Moy, jmoy@proteon.com<br />

2<br />

WG Mailing List(s):<br />

ospfigp@trantor.umd.edu<br />

o<br />

Date of Last Meeting:<br />

April 1989, Cocoa Beach, FL<br />

¯<br />

¯<br />

Date of Next Meeting: Teleconference scheduled tentatively<br />

for the beginning of June<br />

Pending or New Objectives:<br />

o New revision of specification to be submitted (5/89)<br />

o Testing of implementations (summer 89)<br />

o Final specification to be submitted (fall 89)<br />

¯<br />

Progress to Date (e.g., documents produced):<br />

o The OSPF Specification, first revision (1/89)<br />

o First revision of the OSPF specification finished<br />

(1/89)<br />

o Two OSPF implementations nearing completion<br />

o OSPF presentation given during IETF plenary (4/89)<br />

-103-


Open SPF-based IGP Working Group<br />

Chairpersons: Mike Petry/UMD and John Moy/Proteon<br />

CURRENT<br />

Reported<br />

MEETING REPORT<br />

by John Moy<br />

AGENDA<br />

The OSPFIGP working group met for a half day on April llth<br />

in Cocoa Beach.<br />

ATTENDEES<br />

MINUTES<br />

-~effrey Burgan<br />

.~-Rob Coltun<br />

,Dino Farinacci<br />

~Elise Gerich<br />

Jeffrey Honig<br />

Van Jacobson<br />

Steve Knight<br />

Mike Little<br />

Milo Medin<br />

John Moy<br />

Mike Petry<br />

Robert J. Reschly<br />

Paul Tsuchiya<br />

Ross Veach<br />

jeff@nsipo.nasa.gov<br />

rcoltun@trantor.umd.edu<br />

dino@bridge2.3com.com<br />

epg@merit.edu<br />

jchesonneotn.cornell.edu<br />

van@helio.ee.lblogov<br />

knight@baldmt.crayocom<br />

little@saic.com<br />

medin@nsipo.nasa.gov<br />

jmoy@proteo~.com<br />

petry@trantor.umd.edu<br />

reschly@brl.mil<br />

tsuchiya@gateway.mitreoorg<br />

rrv@uxc.cso.uiucoedu<br />

It was decided to shorten the name of the protocol, and the<br />

name of the working group, from OSPFIGP to OSPF.<br />

¯<br />

¯<br />

¯<br />

We talked for a while about variable lenqth subnet masks.<br />

The present OSPF specification attempts ~:¢) specify a minimum<br />

number of rules so that the set of subnet masks for any IP<br />

network is consistent. It was widely viewed that these<br />

rules, and their attendant explanation, were inadequate.<br />

Much more text is needed to explain valid methods for<br />

assigning subnet masks. It was agreed that this kind of<br />

discussion is outside the scope of the routing protocol, and<br />

so should be moved to a separate document.<br />

The subject of authentication came up. OSPF has a 16-bit<br />

authentication type field, and a 64-bit field that can be<br />

used for things like encrypted checksums, in its standard<br />

packet header. Jeff Schiller explained his new proposal for<br />

an authentication IP option. This may alleviate the need<br />

for authentication support in the OSPF header. However, for<br />

the moment we decided to keep the authentication support<br />

unchanged.<br />

We previewed the presentation that was presented to the IETF<br />

-104-


Page 2<br />

Open SPF-based IGP Working Group<br />

¯ The following changes to the OSPF specification were agreed<br />

upon. Small changes have been omitted. For more details,<br />

see the next draft of the OSPF specification.<br />

a¯<br />

Do<br />

co<br />

The [)-bit was removed from the summary links<br />

advertisement. Router IDs now must be distinguishable<br />

from class A, B, and C network numbers.<br />

IP interface addresses are now specified in a router’s<br />

router links advertisement.<br />

Cost of links to transit nodes must be > 0.<br />

Receiving a Database Description packet with the INIT<br />

bit set always resets the adjacency.<br />

The DR calculation procedure was modified slightly. ~<br />

A DR priority of 0 means that the router is ineligible<br />

to become DR.<br />

OSPF routing packets will have their IP precedence set<br />

to "<strong>Internet</strong>work Control".<br />

A network mask has been added to the summary links<br />

advertisement.<br />

® There was discussion of the LS°checksum field which resides<br />

in the link state advertisement header~ This currently<br />

specifies the Fletcher (ISO) checksum. We could not find any<br />

reason why this checksum is stronger than the IP checksum,<br />

and it is harder to calculate. A decision to change to the<br />

IP checksum is pending. Van Jacobson offered references<br />

comparing the two checksums. In any case, the calculation of<br />

the LS checksum field is not optional¯ 0 will be an illegal<br />

value, regardless of which~checksum is used.<br />

¯ The two current OSPF implementations reported their<br />

progress. John Moy’s implementation is written and is in the<br />

debugging stage. Rob Coltun has made similar progress. The<br />

two implementations have not yet attempted to talk to each<br />

other. Performance data is expected at the next IETF.<br />

-105-


Open Systems Routing Working Group<br />

Chairperson: Marianne Lepp/BBN<br />

CHARTER<br />

Description<br />

of Working Group:<br />

The Open Systems Routing Working Group is chartered to<br />

develop a policy-based AS-AS routing protocol that will<br />

accommodate size and general topology°<br />

Specific<br />

Objectives:<br />

Architecture<br />

Functional Specification<br />

Draft Protocol Specification<br />

Estimated Timeframe for Completion:<br />

December 1989<br />

-106-


Open Systems Routing Working Group<br />

Chairperson: Marianne Lepp/BBN<br />

STATUS UPDATE<br />

I. Chairperson: Marianne Lepp, mlepp@bbn.com<br />

2. WG Mailing List: open-rout-interest<br />

3. Last meeting: teleconference at BBN and ISI March 23, 1989<br />

4. Next Meeting: late May~ to be announced<br />

5. Pending or New Objectives:<br />

6. Progress to date (e.g., Documents Produced):<br />

o IDEA 007 Requirements<br />

o Functional Specification<br />

o Architecture in draft<br />

CURRENT MEETING<br />

REPORT<br />

none<br />

-107-


OSI Interoperability Working Group<br />

Chairpersons: Ross CalIon/DEC and Robert Hagens/Univ of Wisc<br />

CHARTER<br />

Description<br />

of Working Group:<br />

Help facilitate the incorporation of the OSI protocol suite<br />

into the <strong>Internet</strong>, to operate in parallel: with the TCP/IP<br />

protocol suite. Facilitate the co-existence and<br />

interoperability of the TCP/IP and OSI protocol suites.<br />

Specific Objectives:<br />

The following are specific short-term goals and objectives<br />

for the OSI WG. Other mid-term objectives have also been<br />

identified and are available from the chairs.<br />

Specify an addressing format (from those available from<br />

the OSI NSAP addressing structure) for use in the<br />

<strong>Internet</strong>. Coordinate addressing format with GOSIP<br />

version 2 and possibly other groups.<br />

Review the OSI protocol mechanisms proposed for the<br />

upcoming Berkeley release 4.4. Coordinate efforts with<br />

Berkeley folks.<br />

Review GOSIP. Open liaison with Government OSI Users<br />

Group (GOSIUG) for feedback of issues and concerns that<br />

we may discover.<br />

What routing should be used short term for (i)<br />

intra-domain routing; and (ii) inter-domain routing?<br />

For interoperability between OSI end systems and TCP/IP<br />

end systems, there will need to be application layer<br />

gateways. Are there outstanding issues remaining here?<br />

Review short term issues involved in adding OSI<br />

gateways to the <strong>Internet</strong>. Preferably, this should<br />

allow OSI and/or dual gateways to be present by the<br />

time that Berkeley release 4.4 comes out.<br />

Estimated Timeframe for Completion:<br />

Still being determined<br />

-108-


OSI Interoperability Working Group<br />

Chairpersons: Ross Callon/DEC and Robert Hagens/Univ of Wisc<br />

STATUS UPDATE<br />

I® Chairperson’s: Ross Callon (DEC) callon@erlang.dec.com<br />

Rob Hagens (UWisc) hagens@cs.wisc.edu<br />

o<br />

WG Mailing List(s)<br />

ietf-osi@cs.wisc.edu - submissions to list<br />

ietf-osi-request@cs, wisc. edu - . addition/deletions<br />

3. ’Date of Last Meeting: Cocoa Beach, April 11-14, 1989<br />

e<br />

Date of Next Meeting: Stanford, July 1989<br />

o<br />

Pending or New Objectives :<br />

Write RFC for CLNP Echo. (draft by the next meeting)<br />

Propose mechanism for encapsulation~routing~network<br />

management of CLNP inside DoD IP for production purposes.<br />

(very rough draft of issues by the next meeting)<br />

Prepare the IETF-OSI "OSI documents to read" list. (ongoing)<br />

Prepare IETF-OSI comments on Gosip V2. (at the next meeting)<br />

6. Progress to Date (e.g., documents produced):<br />

o RFC 1069 and 1070<br />

We have made significant progress toward aligning the<br />

proposed <strong>Internet</strong> NSAP address format (from RFC 1069)<br />

with the Gosip NSAP address format, version 2.<br />

We have started definition of an echo-request/<br />

echo-reply function to propose as an RFC and possibly<br />

as an addendum to ISO 8473.<br />

7. Documents Produced: RFC 1.069, 1070<br />

-109-


OSI Interoperability Working Group<br />

¯<br />

Chairpersons: Ross CalIon/DEC and Rob Hagens/Univ of Wisc<br />

CURRENT<br />

Reported<br />

MEETING REPORT<br />

by Ross Callon and Rob Hagens<br />

AGENDA<br />

Morning<br />

io<br />

Status:<br />

- Gosip, version 2<br />

- Berkeley 4.4 release<br />

2. Echo function for CLNP (ISO 8473)<br />

3. Alignment of OSI NSAP address proposals<br />

- RFC 1069<br />

- New proposal from NIST<br />

- New proposal from Boeing<br />

Afternoon<br />

©<br />

Discussion:<br />

when do we really need OSI in the <strong>Internet</strong>?<br />

~<br />

Discussion: proposed interoperability strategies<br />

0<br />

Tentative<br />

plans for future WG meetings<br />

ATTENDEES<br />

David Borman<br />

Ross Callon<br />

Mike Collins<br />

Jerry Cronin<br />

Farokh Deboo<br />

Dino Farinacci<br />

Lionel Geretz<br />

Martin Gross<br />

Rob Hagens<br />

Tony Hain<br />

Bob Harris<br />

Gary Malkin<br />

Keith McCloghrie<br />

Don Merritt<br />

Russ Mundy<br />

Zbigniew Opalka<br />

Rex Pugh<br />

Yakov Rekhter<br />

Carl-herbert Rokitansky<br />

Milt Roselinsky<br />

Dallas A. Scott<br />

Jim Sheridan<br />

Lance Travis<br />

Rick Wilder<br />

dab@cray.com<br />

callon@erlang.dec.com<br />

collins@cccomfecc.llnl.gov<br />

1842eeg-intg2@afcc-oal.arpa<br />

..!sun!bridge2!fjd<br />

dino@bridge2.3com.com<br />

lionel@salt.acc.com<br />

martin@protolaba.dca.mil<br />

hagens@cs.wisc.edu<br />

haun@ccc.mfecc.llnl.gov<br />

harris@sparta.com<br />

gmalkin@proteon.com<br />

kzm@twg.com<br />

merritt@brl.mil<br />

mundy@beast.ddn.mil<br />

zopalka@bbn.com<br />

pugh%hprnd@hplabs.hp.com<br />

yakov@ibm.com<br />

roki@dhafeu52 bitnet<br />

cmcvax!milt@hub.ucsb.edu<br />

dscott@gateway.mitre.org<br />

jsherida@ibm.com<br />

cmt@apollo.com<br />

rick@gateway.mitre.org<br />

-ii0-


Page 2<br />

OSI Interoperability Working Group<br />

MINUTES<br />

The meeting was convened by co-chail~nen Ross Callon and Rob<br />

Hagens. An attendance list will be published with the <strong>Proceedings</strong><br />

of the IETF. The major issues discussed at this meeting included:<br />

status reports on 4.4 BSD and GOSIP Version 2, an Echo function<br />

for CLNP, a tilmetable for needed OSI functionality in the<br />

<strong>Internet</strong>, and alignment of the NSAP address proposals.<br />

Brief status reports on 4.4 BSD and GOSIP Version 2 were given by<br />

Rob Hagens.<br />

4.4 BSD<br />

TP4/CLNP runs over software loopback.<br />

Next step will be testing with EON<br />

GOSIP Version 2<br />

A draft for public comment will be released<br />

90 day comment period.<br />

in early May.<br />

ECHO Function for CLNP<br />

Rob Hagens presented his proposal for an Ecl~o function for CLNP.<br />

The proposal was discussed and several changes to the proposal<br />

were recommended by the working group. An outline of the<br />

proposal along with the recommended changes is included below.<br />

Mechanics<br />

Echo and Echo Reply must be processed in the same manner as a DT<br />

PDU. EC and ECR PDUs are identical to the DT PDUs with the<br />

following exceptions: I) type field EC IE, ECR IF. 2)<br />

segmentation part is always present. 3) the E/R flag is<br />

optional.<br />

The E/R flag being optional was one of the changes recommended by<br />

the working group. The original proposal stated that the E/R flag<br />

never be set.<br />

Receiving EC<br />

EC processed like DT.<br />

EC given to Echo entity<br />

Echo entity issues an ECR with:<br />

¯<br />

source and destination addresses reversed<br />

TTL set to the normal value that the system uses when<br />

generating a DT<br />

EC PDU included as data parameter of ECR<br />

ER flag optionally set on ECR.<br />

A note will be added stating that the E/R flag can be optionally<br />

set, but the usefulness of the ER pdu will depend upon the<br />

ability of the receiving system to process it.<br />

-ill -


Page 3<br />

OSI Interoperability Working Group<br />

PDU Options<br />

All options in EC are copied in ECR.<br />

RR option is copied but initialized<br />

into the ECR data parameter.<br />

since the EC RR is copied<br />

The setting of the priority option was discussed and it was<br />

decided that it should not always be set to a default value of 0.<br />

Source Routing<br />

The group discussed whether source.routing could be used as a<br />

substitution to the proposed echo function. Tihe idea would be<br />

that to simulate echo, one could source route a packet through a<br />

remote peer and back to the originator. The first problem with<br />

source routing is that it has a bug in its specification whereby<br />

it will only work if all intermediate systems along the path<br />

implement source routing. The second problem is that the use of<br />

the source routing option will change the packet processing,<br />

thereby failing to meet the goal of treating echo packets as much<br />

as possible like normal data packets. In addition, it was<br />

pointed out that the number of source route entries is limited<br />

due to the PDU header size. In principle, it may not be possible<br />

to ping any system given the limited number of source route<br />

entries.<br />

In addition,<br />

automatically<br />

ECR pdus will never have a source route<br />

generated.<br />

When is OSI needed in the INTERNET?<br />

The group discussed this issue which has been a repeated topic in<br />

several network forums. The group developed a timetable of when<br />

OSI functionality should be available on the internet.<br />

t0: 4.4 BSD is released (beta).<br />

cI/~S subnets (isolated).<br />

Encapsulation between isolated subnets by using smart gateways<br />

with fixed tables.<br />

tl: 4.4 BSD is released.<br />

t2: Intra Domain IS-IS Routing (Vendor’s release).<br />

Inter Domain IS-IS Routing (Static Tables).<br />

Intra Domain IS-IS reaches DP status.<br />

ALIGNMENT OF NSAP ADDRESS PROPOSALS<br />

Ross Callon led the discussion of the three NSAP address<br />

proposals. The three proposals are outlined below.<br />

RFC 1069<br />

Goal<br />

Consistent with ISO NSAP, ANSI/ISO Intra Domain Routing, Other<br />

-112-


Page 4<br />

OSI Interoperability<br />

Intra Domain Routing,<br />

Flexibility.<br />

Working Group<br />

and Future Inter Domain Routing.<br />

Long Term Growth.<br />

Result<br />

Use ICD value assigned to DoD.<br />

Specify high order fields.<br />

Flexible ’IGP Specific’ part.<br />

Selector.<br />

Pad to 20 octets.<br />

Two IGP Specific formats specified; DoD, and ANSl/OSI.<br />

Problems<br />

Divergence (GOSIP and ANSI).<br />

Too much flexibility (multiple IGP Specific Formats)°<br />

NIST PROPOSAL<br />

Basically RFC 1069 with the following changes:<br />

Expanded Global Area to 3 octets and renamed the field<br />

’ADMIN AUTHORITY’ (was 2 octets in RFC 1069).<br />

Specifies one IGP Specific Format that is ANSI consistent<br />

(last 9 octets consistent with intra domain routing).<br />

padding was moved.<br />

BOEING PROPOSAL<br />

AFI specifies ISO DCC for the IDI.<br />

ie. for the US AFI DCC IDI<br />

39 84 OF<br />

Not padded to 20 Octets<br />

ORG ID 5 bytes<br />

The working group discussed the Boeing proposal and realizes<br />

there should be more fields to meet ihierarchical needs but the 5<br />

byte ORG ID is excessive, therfore the group concluded that the<br />

proposal is not appropriate~<br />

It was decided that the differences between the RFC 1069 and the<br />

NIST PROPOSAL would be resolved in the following manner:<br />

i) Rewrite RFC 1069 with G].obal Area expanded to 3 octets and<br />

specifying one IGP Specific Format.<br />

Suggest that NIST change their proposal so that the reserved<br />

section matches our padding (after routing domain).<br />

This work should be completed<br />

by the next IETF.<br />

AGENDA FOR NEXT IETF<br />

The agenda for the next IETF was proposed as follows: one half<br />

day each for presentations and discussions on (i) Directory<br />

Services; (ii) Intra Domain Routing; (iii) Inter Domain Routing;<br />

and (iv) comments on Gosip version<br />

-113-


-114-


PDN ROUTING WORKING GROUP<br />

Chairperson: Carl-Herbert Rokitansky/Fern University of Hagen<br />

CHARTER<br />

Description<br />

of Working Group:<br />

The DoD INTERNET TCP/IP protocol suite has developed into de<br />

facto industry standard for heterogenous packet switching<br />

computer networks. In the US, several hundreds of INTERNET<br />

networks are connected together; however the situation is<br />

completely different in Europe: The only network which could be<br />

used as a backbone to allow interoperation between the manly<br />

local area networks in Europe, now subscribing to the DoD<br />

INTERNET TCP/IP protocol suite, would be the system of Public<br />

Data Networks (PDN). However, so far, no algorithms were<br />

provided to dynamically route INTERNET d~tagrams through Xo25<br />

public data networks. Therefore the goals of the Public Data<br />

Network Routing working group are the development, definition<br />

and specification of required routing and gateway algorithms for<br />

an improved routing of INTERNET datagrams through the system<br />

of X.25 Public Data Networks (PDN) to allow worldwide<br />

interoperation between TCP/IP networks in various countries. In<br />

addition, the application and/or modification of the developed<br />

algorithms to interconnect local TCP/IP networks via ISDN<br />

(Integrated Services Digital Network) will be considered.<br />

Specific Objectives and Estimated Timeframe for Completion:<br />

Application of the INTERNET Cluster Addressing Scheme to<br />

Public Data Networks. (Already done, see produced<br />

documents)<br />

Development of hierarchical VAN-gateway algorithms for<br />

worldwide INTERNET network reachability information<br />

exchange between VAN,gateways (Already done, see produced<br />

documents)<br />

Assignment of INTERNET/PDN-cluster network numbers to<br />

national public data networks. (Mapping between INTERNET<br />

network numbers and X.121 Data Network Identification Codes<br />

(DNICs) (almost done, RFC-Draft)<br />

Assignment of INTERNET/PDN-cluster addresses to PDN-hosts<br />

and VAN-gateways according to the developed hierarchical<br />

VAN-gateway algorithms (RFC-Draft, will be completed by<br />

July ’89)<br />

5) Definition of the PDN-cluster addressing scheme as an<br />

<strong>Internet</strong> standard (to be written up as an RFC-Draft by Fall<br />

’89)<br />

Specification of an X.121 Address resolution protocol<br />

(RFC-Draft, expected to be Completed by July ’89)<br />

-118-


Page 2<br />

Charter<br />

PDN Routing<br />

Specification of an X.25 Call Setup and Charging<br />

Determination Protocol (RFC-Draft, expected to be completed<br />

by Fall ’89)<br />

8) Specification of an X.25 Access and Forwarding Control<br />

Scheme (to be written up as an RFC-Draft by Fall ’89 or<br />

later)<br />

9) Specification of routing metrics taking X.25 charges into<br />

account (to be written up as an RFC-Draft by Fall ’89 or<br />

later)<br />

lO) Delayed TCP/IP header compression by VAN-gateways and<br />

PDN-hosts (new objective, will be considered Fall ’89 or<br />

later)<br />

11)<br />

12)<br />

Provide a testbed for worldwide interoperability between<br />

local TCP/IP networks via the system of X.25 public data<br />

networks (PDN) (starting June ’89)<br />

Implementation of the re~_aired algorithms and protocols in<br />

a VAN-BoX (Test version towards End ’89)<br />

13) Interoperability between ISO/OSI hosts on TCP/IP networks<br />

through PDN (1989/90)<br />

14) Consideration of INTERNET Route Servers (1990)<br />

15) Interoperability between local TCP/IP networks via ISDN<br />

(1990)<br />

Development of <strong>Internet</strong>work Management Protocols for<br />

worldwide cooperation and coordination of network control<br />

and network information centers (starting 1990).<br />

-119-


PDN Routing Working Group<br />

Chairperson: Carl-Herbert Rokitansky/Fern University of Hagen<br />

STATUS UPDATE<br />

Chairperson: Dr. Carl-Herbert Rokitansky, Fern University of<br />

Hagen, D-5860 ISERLOHN, FRG<br />

E-Mail: roki@DHAFEU52.BITNET,<br />

Tel: ++49/2371/566-235<br />

roki@A. ISI.EDU;<br />

WG Mailing List(s)<br />

pdn-wg@BBN.COM: For internal discussions and information<br />

exchange between members of the PDN Routing working group.<br />

pdn-interest@BBN.COM: For information about:<br />

- Status report and proceedings of the PDN Routing WG<br />

- Draft proposals of documents and ]papers<br />

- Documents and papers published by PDN WG members<br />

- Important discussion on PDN Routing issues.<br />

pdn-request@BBN.COM: For people interested in being put on the<br />

"pdn-interest" mailing list.<br />

o<br />

®<br />

Date of Last Meeting: April IETF 1989, Cocoa Beach, FL<br />

Date of Next Meeting: Oct 31 - Nov 2, 1989, IETF/Univ of Hawaii<br />

(Intensive information exchange via e-mail meanwhile)<br />

®<br />

Pending or New Objectives:<br />

P06) Definition of the PDN-cluster addressing scheme as<br />

<strong>Internet</strong> standard: Expected to be written up as an<br />

RFC-Draft by Fall ’89.<br />

PO7)<br />

P08)<br />

PO9)<br />

Specification of Xo25 Call Setup and Charging<br />

Determination Protocol: Functionality, data structure and<br />

state diagram have already been defined, will allow<br />

reverse charging on international (!) X.25 connections,<br />

is currently in the progress to be written up as an<br />

RFC-Draft, and is expected to be completed by Fall ’89.<br />

Specification of an X.25 Access and Forwarding Control<br />

Scheme: Functionality and data structure have already<br />

been defined, might be included in the RFC-Draft above on<br />

X.25 Call Setup and Charging Determination Protocol, and<br />

is expected to be completed by late Fall ’89.<br />

Specification of routing metrics taking X.25 charges into<br />

account: Proposal is expected to be written up as an<br />

RFC-Draft by Fall ’89 or later.<br />

-120-


Page 2<br />

Status Update PDN Routing<br />

PO10) Delayed TCP/IP header compression: As a result from Van<br />

Jacobsons presentation (IETF, April 13, 1989), a delayed<br />

version will be considered to be used on X.25 connections<br />

by VAN-gateways and PDN-hosts, as a new objective (Fall<br />

’89)<br />

POll) Provide a testbed for worldwide interoperability between<br />

local TCP/IP networks via the system of X.25 public data<br />

networks (PDN): Several institutes and research<br />

establishments in Europe, USA and Australia have already<br />

agreed to participate in. these tests, which are expected<br />

to start in June ’89.<br />

POI2) Implementation of the re,fired algorithms and protocols in<br />

a VAN-BoX: All the algorithms and protocols specified<br />

above are intended to be implemented in a VAN-BoX (or on<br />

workstation) towards the end of 1989 (first test version).<br />

POI3) Interoperability between ISO/OSI hosts on TCP/IP networks<br />

through PDN: Will be tested and demonstrated in<br />

connection with national and international PDN-tests (see<br />

below).<br />

POI4) Consideration of Route Servers: Already discussed, but no<br />

detailed specification so far; will be considered with<br />

regard to results from international PDN-tests (see<br />

below).<br />

POI5) Interoperability between local TCP/IP networks via ISDN:<br />

First discussions and proposals were already made, will be<br />

considered in detail in 1990.<br />

POI6) <strong>Internet</strong>work Management Protocols (cooperation of NOCs and<br />

NICs): Will be considered with regard to results from<br />

international PDN-tests (see above).<br />

6. Progress to Date (e.g., documents produced):<br />

PDN-cluster addressing scheme:<br />

Rokitansky, C.-H., "<strong>Internet</strong> Cluster Addressing Scheme and<br />

Its Application to Public Data Networks", in <strong>Proceedings</strong> of<br />

the 9th International Conference on Computer Communication<br />

(ICCC’88), pp. 482-491, Editor: J.Raviv, Tel Aviv, Israel,<br />

Oct 30 - Nov 4, 1988.<br />

¯ Hierarchical VAN-Gateway Algorithms:<br />

R0kitansky, C.-H., "Hierarchical VAN-Gateway Algorithms and<br />

PDN-Cluster Addressing Scheme for Worldwide Interoperation<br />

Between Local TCP/IP Networks Via X.25 Networks", in<br />

<strong>Proceedings</strong> of ITG/GI Conference on "Communication in<br />

Distributed Systems" (Informatik Fachberichte 205,<br />

Kommunikation in verteilten Systemen, ITG/GI Fachtagung,<br />

Stuttgart, P.J. Kuehn (Hrsg.), ISBN 3-540-50893-7<br />

-121-


Page 3<br />

Status Update PDN Routing<br />

Springer-Verlag Berlin Heidelberg New York~ ISBN<br />

0-387-50893-7 Springer-Verlag New York Berlin Heidelberg),<br />

pp. 758-774, Stuttgart, Feb 22-24, 1989¯<br />

o Assignment of INTERNET/PDN-cluster network numbers to<br />

DNICs: Rokitansky C.-H., Fern University of Hagen,<br />

"Assignment and Reservation of INTERNET Network Numbers for<br />

the PDN-Cluster", RFC-Draft, Feb 1989.<br />

Assignment of default INTERNET/PDN-cluster addresses to<br />

VAN-gateways: Currently in the progress of being written<br />

up as an RFC-Draft, expected to be completed by July ’89,<br />

(might be included into the RFC-Draft above).<br />

¯ X.121 Address Resolution Protocol (first version has<br />

already been written up as an RFC-Draft to be discussed<br />

between members of the PDN Routing WG, and is expected to<br />

be completed by July ’89).<br />

-122-


PDN Routing Working Group<br />

Chairperson: Carl-Herbet iRokitansky/Fern University of Hagen<br />

CURRENT MEETING REPORT<br />

Reported by Carl-Herbert Rokitansky<br />

AGENDA<br />

ATTENDEES<br />

Introduction<br />

Background information (European situation, X.25 Research<br />

Network)<br />

Report from CeBIT MultiNET TCP/IP demonstration on Hannover<br />

Fair, March 8.-15, 1989 (Carl-H. Rokitansky, FernUni)<br />

Status report on BBN-VAN-GATEWAY (butterfly replacement,<br />

EGP, etc.) (Mike Brescia, BBN) -Discussion<br />

Status and technical discussion of short term goals<br />

Assignment and reservation of PDN-cluster network numbers<br />

to national X.25 public data networks (DNICs), RFC Draft<br />

(Roki)<br />

Assignment of INTERNET IP addresses to VAN-gateways<br />

according to the developed hierarchical VAN-gateway<br />

algorithms (Roki)<br />

X.121 address resolution protocol, RFC Draft (Mike Brescia,<br />

Roki)<br />

Access control and reverse charging on international X.25<br />

connections<br />

Discussion on assignment of an autonomous system number to<br />

PDN<br />

Discussion on a modified EGP and routing metrics to be used<br />

between VAN-gateways<br />

Discussion of methods and requirements involving route<br />

servers<br />

Discussion on the application of the INTERNET cluster<br />

addressing scheme and developed gateway algorithms to<br />

Integrated Services Digital Networks (ISDN) to provide<br />

interoperability between local TCP/IP networks~through ISDN<br />

(Co Rokitansky, FernUni)<br />

Coordination of PDN Routing performance tests<br />

Discussion on documents to be published by members of the<br />

PDN Routing WG<br />

Assignment of action items<br />

Miscellaneous (mailing lists, etc.)<br />

Jerry Cronin<br />

Farokh Deboo<br />

Lionel Geretz<br />

Martin Gross<br />

John Lekashman<br />

John Moy<br />

Bill Nowicki<br />

Zbigniew Opalka<br />

2eeg-intg2@AFCC-OAI.ARPA<br />

..!sun!bridge2!fjd<br />

lioneI@SALT.ACC.COM<br />

martin@PROTOLABA.DCA.MIL<br />

lekash@ORVILLE.NAS.NASA.GOV<br />

jmoy@PROTEON.COM<br />

nowicki@SUN.COM<br />

zopalka@BBN.COM<br />

Carl-Herbert Rokitansky roki@DHAFEU52.BITNET<br />

Mary Stahl<br />

stahI@SRI-NIC.ARPA<br />

Rick Wilder<br />

rick@GATEWAY.MITRE.ORG<br />

-.123-


Page 2<br />

PDN Routing<br />

MINUTES<br />

X.25 Research Network (reported by C.-H. Rokitansky (Roki), Fern<br />

University):<br />

Towards the end of this year an "X.25 Research Network" will be<br />

installed and operated by the German PTT A large number of German<br />

universities and research institutes wil~ be ~connected to this X.25<br />

Research Network at fixed costs. A gateway to the German DATEX-P<br />

network will allow interoperation with the worldwide system of X.25<br />

Public Data Networks (PDN).<br />

Since most universities do have local TCP/IP networks, they are<br />

especially interested in exchanging TCP/IP datagrams with each other<br />

through this X.25 research network. An advantage of this kind of X.25<br />

network is the fact, that the exchange of network reachability<br />

information between hosts/gateways attached to the X.25 research<br />

network will NOT BE COST SENSITIVE, although we should try, of<br />

course, to limit the amount of such messages.<br />

Similar X.25 research networks will be made operational in other<br />

European countries, and they will probably be interconnected to an<br />

European X.25 research network one day.<br />

Report from CeBIT MultiNET (Mar ’89) TCP/IP Demo on Hannover Fair (by<br />

Roki):<br />

"The CeBIT MultiNET ’89 demonstration of system-independent networks<br />

was a further development of the two preceding MultiNET shows.<br />

MultiNET’s main object has remained unchanged: the joint presentation<br />

of international communication standards withproducts already<br />

available by a variety of EDP suppliers." (see slides presented at<br />

the Plenary) "Like before, CeBIT MultiNET ’89 demonstrates the<br />

current state of communications technology ....<br />

After a careful<br />

analysis of the actual needs of many network users, the following<br />

essential topics have been choosen for the CeBIT MultiNET ’89: I.<br />

coexistence and migration from TCP/IP to "ISO’"; 2. Network<br />

Management; 3. Network Applications ....<br />

The clearly defined range<br />

of functions together with the popular program interfaces and the<br />

broad use of the TCP/IP protocol family will surely, continue to<br />

stimulate the porting of network applications onto these<br />

communcication protocols, just as it has done up to now. Recently, a<br />

new algorithm for TCP/IP has been published, which offers<br />

considerable performance advantages for the protocol handling and<br />

which shows that TCP/IP is still being further developed. Some of the<br />

~r ax~rac~ i~p~emen~tions zrom ceBIT-MultiNET,,, are already based MultiNET on this Services new Gesellschaft algorithm.,, fuer<br />

Tale- und Datenkommunikation mbH, Venloer Strasse 131, D-5024<br />

Pulheim, FRG.)<br />

As can be seen from the slides, 32 suppliers demonstrated TCP/IP<br />

interoperability and ISO/OSI coexistence. The relatively great number<br />

of suppliers offering TCP/IP via X.25 (16), IP Router (17),<br />

Gateways (17), is of special interest for PDN Routing WG, although,of<br />

course, no dynamic routing of TCP/IP datagrams through the system of<br />

-124-


Page 3<br />

PDN Routing WorMing<br />

Group<br />

X.25 Public Data Networks is provided. Most suppliers expect an even<br />

increasing demand for the ~CP/IP protocol suite within the next<br />

years.<br />

Status Report on BBN-VAN-GATEWAY (Zbigniew Opalka, BBN):<br />

The current LSI-II/23 BBN-VAN-GATEWAY, will be replaced by a<br />

butterfly gateway by late May ’89. EGP will be available by then.<br />

Hierarchical VAN-Gateway Algorithms (Roki)<br />

The concept of hierarchical VAN-gateway algorithms, which allow the<br />

distribution of worldwide INTERNET network teachability information<br />

within a few number of hops in a very efficient way, were discussed<br />

in detail. A four level hierarchy is defined so far: I. LOCAL-VAN;<br />

2. DATA-NETWORK- VAN; 3.. COUNTRY-VAN; 4. ZONE-VAN. An additional<br />

level (REGION-VAN) might be specified between COUNTRY-VAN and<br />

ZONE-VAN. An advantage of the proposed algorithms is, that each<br />

VAN-gateway might have several direct neighbors, but there is ONE (!)<br />

only, which it has to call ACTIVELY for exchanging worldwide network<br />

reachability information. It is important to understand, that the<br />

whole data traffic will not necessarily be routed via the higher<br />

level VAN-gateways (level 2 to 4., which might be regarded as route<br />

servers in this case), but can be exchanged via a direct X.25<br />

connection (SVC) between LOCAL-VANs and/or PDN-hosts. The concept<br />

also provides for stupid LOCAL-VANs, which do not maintain worldwide<br />

network-reachability tables, but use their DATA-NETWORK-VAN as a<br />

default gateway. If this gateway knows a better route towards the<br />

destination network through the PDN, it sends an ICMP-Redirect<br />

message (similar to an ICMP Host Redirect message) to the calling<br />

LOCAL-VAN, specifying the INTERNET address of the next hop<br />

VAN-gateway, which can be any address in the PDN-cluster, (as an<br />

significant advantage of the INTERNET cluster addressing scheme).<br />

John Moy, Proteon, suggested to call this message "ICMP Gateway<br />

Redirect Message".<br />

Assignment and Reservation of PDN-Cluster Network Numbers to DNICs<br />

(Roki):<br />

This RFC draft contains a proposal for the assignment of INTERNET<br />

network numbers to existing X.25 national public data networks<br />

according to the proposed PDN-cluster addressing scheme, taking the<br />

structure of the X.121 international numbering plan for public data<br />

networks (6 zones worldwide) into account. The reservation (1024<br />

class B network numbers for the PDN-cluster) and the assignment is<br />

based on the expected growth of national public data networks in the<br />

various countries, and was done with regard to a specification of<br />

subclusters of the PDN-cluster (Europe-cluster, North<br />

America-cluster, North-Europe-cluster, etc.). Where possible,<br />

adjacent countries were assigned adjacent networks or subclusters,<br />

having in mind some kind of subcluster oriented (cartesian) routing<br />

algorithms for future use. A direct mapping between the INTERNET


Page 4<br />

PDN Routing Working<br />

Group<br />

network number and the corresponding DNIC can be performed by an<br />

algorithm for all US PDN-cluster network numbers within the<br />

North-American subcluster.<br />

The following <strong>Internet</strong> network numbers are reserved for the PDN<br />

cluster:<br />

188.000 - 188.255<br />

189.000 - 189.255<br />

190.000 - 190.127<br />

190.128 - 190.191<br />

190.192 - 190.255<br />

Europe<br />

North America<br />

Asia<br />

<br />

Pacific<br />

(Zone 2) , assigned:<br />

(Zone 3), assigned:<br />

(Zone 4), assigned:<br />

(Zone 5) assigned: 20<br />

191.000 - 191.127<br />

191.128 - 191.191<br />

191.192 - 191.255<br />

South America<br />

<br />

Africa<br />

(Zone 7)<br />

(Zone 6)<br />

assigned: 40<br />

assigned: 8<br />

A list of already assigned PDN-cluster network numbers is shown in<br />

the slides presented in the report at the Plenary.<br />

Assignment of INTERNET IP Addresses to VAN-Gateways and PDN-Hosts:<br />

According to the hierarchical VAN-gateway algorithms and the<br />

PDN-cluster addressing scheme, a proposal for the assignment of<br />

INTERNET addresses to PDN-hosts and VAN-gateways was presented by<br />

Roki and discussed in detail. This scheme allows to address a<br />

maximum number of 32.512 PDN-hosts [p.n.l.h] - [p.n.127.h] and 32.512<br />

LOCAL-VANs [p.n.128.v] - [p.n.254.v] in each national public data<br />

network to which an INTERNET (class B) PDN-cluster network number<br />

[p.n.r.r] has been assigned. In addition, 255 INTERNET addresses in<br />

each PDN network are reserved for higher level. VAN-gateways:<br />

DATA-NETWORK VANs [p.n.255.1] - [p.n.255.63]<br />

[p.n.255.64] - [p.n.255.127] resex~ed for future use<br />

COUNTRY VANs [p.n.255.128] - [p n.255.159]<br />

- [p.n.255.191] reserved for future use<br />

[p.n.255. 160]<br />

REGION VANs [p.n.255.192] - [p.n.255.207]<br />

future use [p.n.255.208] - [p.n.255 223]<br />

future use<br />

reserved<br />

reserved<br />

for<br />

for<br />

ZONE VANs [p.n.255o224] - [p.n.255.231] and<br />

(ZONE VANs) [p.0.255.224] - [p.0.255.231] "escape code"<br />

[p.n.255.232] - [p.n.255.239] reserved for future use<br />

WORLD VANs [P.n.255.240] - [p.n.255.243] reserved for<br />

future use [p.n.255.244] - [p.n.255.254] reserved for<br />

future use [p.n.255.255] ,Advantages of this<br />

hierarchical addressing scheme are:<br />

-126-


Page 5<br />

PDN Routing Working<br />

Group<br />

a bitmask can be used to distinguish between a PDN-host and<br />

a LOCAL-VAN<br />

a bitmask can be used to distinguish between<br />

PDN-hosts/LOCAL ’VANs and higher level VANs (level 2 VANs<br />

and up = [p.n..255.v])<br />

a bitmask can be used to determine the functionality of<br />

each VAN-gateway<br />

each PDN-host or LOCAL VAN can determine automatically its<br />

default DATA NETWORK VAN (next higher level) [p.n.255.1]<br />

each (higher level) VAN-Gateway (and PDN-host)<br />

determine automatically its default top-level (ZONE VAN)<br />

an "escape code". [p.0.255.224]<br />

Access Control and Reverse Charging on International X.25<br />

Connections:<br />

.<br />

An access control scheme, proposed by Roki, has been discussed in<br />

detail with the group, and it was agreed that some access control in<br />

connection with charging determination is required for the routing of<br />

TCP/IP datagrams through the PDN, if we pro~vide worldwide<br />

interoperability. As a result from this discussion, a modified and<br />

more flexible "X.25 Access Control and Forwarding Scheme" was worked<br />

’ out after the meeting, and was presented in the PDN Routing WG report<br />

at the plenary (see slides)°<br />

Discussion on a Modified EGP and Routing Metrics to be Used Between<br />

VANs:<br />

Since there was not enough time to discuss this issue during the PDN<br />

Routing WG meeting, usage of ei’ther EGP2 or EGP3 was discussed with<br />

Marianne Lepp, Zbigniew Opalka, Roki and others at a "working lunch":<br />

Depending on the support for EGP3, either a modified version of EGP2<br />

or EGP3 will be considered to be used by VAN-gateways to exchange<br />

worldwide network reachability infoz~ation (eventually on an event<br />

driven basis).<br />

Implementation of the Proposed Algorithms in a VAN-BoX (or on<br />

Workstation):<br />

Fortunately, within the last year, the IETF-PDN Routing working group<br />

has developed most of the required PDN addressing schemes and gateway<br />

algorithms to allow a dynamic routing of TCP/IP datagrams through the<br />

worldwide system of X.25 Public Data Networks (PDN). The required<br />

algorithms and protocols include:<br />

PDN-cluster addressing scheme:<br />

proceedings;<br />

Hierarchical VAN-gateway algorithms:<br />

’89 Proc.<br />

published<br />

published<br />

in ICCC’88<br />

in ITG/GI<br />

-127-


Page 6<br />

PDN Routing<br />

Working Group<br />

Assign. ~Res. of PDN-cluster net #:<br />

published as RFC<br />

draft, ready to be<br />

Assign. ~Res. of PDN-cluster addr.:<br />

written up as an RFC<br />

currently being<br />

X.121 Address Resolution Protocol:<br />

published as an RFC<br />

draft, will be<br />

X.25 Call Setup and Charging Determ.: draft, currently<br />

being specified<br />

X.25 Access and Forwarding Control:<br />

being specified<br />

draft, currently<br />

Modified EGP2 or EGP3 between VANs:<br />

to be defined<br />

currently.in progress<br />

Delayed TCP/IP header compression:<br />

(new objective)<br />

will be considered<br />

By putting all these pieces together, it is intended to implement<br />

these algorithms, with support of the gateway companies (BBN,<br />

Proteon, SUN, 3COM, ACC, cisco, etc.), in a small "VAN-BoX" (and on<br />

workstation) with an Ethernet and an X.25 interface. By placing this<br />

"VAN-BoX" between a local TCP/IP network and an X.25 public data<br />

network, the implemented gateway algorithms will automatically<br />

exchange network reachability information to provide worldwide<br />

INTERNET interoperability between local TCP/IP networks through X.25<br />

Public Data Networks.<br />

Application of the INTERNET Cluster Addressing Scheme to ISDN (Roki):<br />

The application of the INTERNET cluster addressing scheme and the<br />

developed gateway algorithms to Integrated Se]~ices Digital Networks<br />

(ISDN) to provide interoperability between local TCP/I~ networks<br />

through ISDN has been discussed briefly.<br />

E. 164 specifies the numbering plan for the ISDN era. According to<br />

this numbering plan, the International ISDN Number (max. 15 digits)<br />

consists of the Country Code (CC), the National Destination Code<br />

(NDC) and the Subscriber Number (SN). NDC and SN form the National<br />

Significant Number (NSN)<br />

::= ; ::= ;<br />

or ::= .<br />

The INTERNET cluster addressing scheme could be applied to the<br />

ISDN by mapping cluster nets to CC or NDC.<br />

<strong>Internet</strong>work scenarios for PDN-ISDN-PDN and ISDN-PDN-ISDN using<br />

X.121 or E.164 escape codes were discussed. Also the long-term<br />

PDN to/from ISDN solution using numbering ~ identifiers was<br />

sketched.<br />

-128-


Page 7<br />

PDN Routing<br />

Working Group<br />

Coordination of International PDN Routing Performance Tests:<br />

The developed PDN addressing schemes and VAN-gateway algorithms will<br />

be tested with participating sites in the following countries:<br />

Zone 2 (Europe)<br />

Germany: Fern University of Hagen (all VAN-gateway levels)<br />

GMD, St. Augustin (DFN-Gateway)<br />

University of Dortmund (UUCP-Gateway)<br />

University of Karlsruhe (BELWUE)<br />

University of Stuttgart (BELWUE)<br />

Austria: University of Salzburg<br />

Finland: University of Helsinki (NORDUNET)<br />

Italy: CNUCE, Pisa *<br />

Norway: NTARE, Oslo, (NORDL~.~ET)<br />

Sweden: SICS, Stoc.kholm (NORDUNET)<br />

UK: Portsmouth Polytechnic<br />

University College iLondon (INTERNET Gateway)<br />

Zone 3<br />

USA".<br />

Zone 4<br />

(North America):<br />

BBN, Cambridge, MA<br />

CISCO, Menlo Park, CA *<br />

PROTEON *<br />

SRI, Mehlo Park, CA *<br />

SUN, Mountain View, CA *<br />

(Asia)’. Israel ~., Japan ~o<br />

Zone 5 (Pacific):<br />

Australia: CSIRO<br />

Indonesia: LAPAN<br />

Zone 6 (Africa):<br />

Egypt<br />

Zone 7 (South America): Argentina ?, Brazil<br />

(* ... intended, but not yet agreed)<br />

(? ... these countries will.be contacted for participation, to<br />

have at least one representative site for each zone).<br />

First tests have already started within Ge~nany. International<br />

PDN-tests are expected to start in June ’89 between BBN and sites in<br />

Europe and Australia.<br />

Assignment<br />

of action items:<br />

Stahl: Check assignment and specification of INTERNET/PDN-cluster<br />

network numbers for US national public data networks for correctness<br />

(03, June ’89)<br />

Roki: Submit <strong>Internet</strong> Draft "Assignment and Reservation of the<br />

INTERNET Network Numbers for the PDN-Cluster" to IETF Chair and<br />

Reviewers (03, July ’89).<br />

--129-


Page 8<br />

PDN Routing Working Group<br />

Roki: Finish <strong>Internet</strong> Draft "Addressing Scheme for the Assignment of<br />

INTERNET/PDN-Cluster Addresses to VAN-Gateways and PDN-Hosts" for<br />

submission to the IETF Chair and Reviewers (04., July ’89).<br />

Opalka/ Finish <strong>Internet</strong> Draft "X.121 Address Resolution Protocol",<br />

Roki: for submission to the IETF Chair and Reviewers (06, July ’89).<br />

Roki: ~’, Write up <strong>Internet</strong> Drafts "INTERNET Cluster Addressing Scheme<br />

and "Application of the INTERNET Cluster Addressing Scheme to X.25<br />

Public Data Networks" for submission to the IETF Chair and<br />

Reviewers (05, Fall ’89).<br />

Roki: Write up an <strong>Internet</strong> Draft "Hierarchical VAN-Gateway Standards<br />

for Worldwide INTERNET Interoperability" for submission to the IETF<br />

Chair and Reviewers (05, Fall ’89 or later).<br />

Roki: Continue the specification of an <strong>Internet</strong> Draftt "X.25 Call<br />

Setup and Charging Determination Protocol" (07, expected to be<br />

completed by Fall ’89)<br />

Roki: Continue the specification of an <strong>Internet</strong> Draft "X.25 Access<br />

and Forwarding Control Scheme" (08, expected to be completed by<br />

Fall ’89 or later)<br />

Opalka/ Perform international PDN-tests according to the developed<br />

PDN- Roki: cluster addressing scheme and hierarchical VAN-gateway<br />

algorithms between USA (BBN) and sites in Europe (Fern University<br />

Hagen, University of Dortmund, University of Salzburg, etc.),<br />

starting June ’89 (Oil).<br />

A closed PDN Routing WG meeting was held during the afternoon session<br />

of April 12, where some of the PDN Routing objectives and action<br />

items were discussed in more detail.


4.~ I~<br />

o<br />

X "--"<br />

r_. o r’7<br />

I<br />

Z<br />

"~<br />

"el ~<br />

Z<br />

> (1)<br />

Z<br />

fO °,,,4<br />

17 ~<br />

i<br />

r..<br />

4,-~ o~<br />

0 -l.J I--I<br />

~: o ,-4<br />

o,-, Z l--<br />

Z<br />

r7<br />

o<br />

o<br />

l.IJ<br />

I<br />

03<br />

03<br />

0<br />

r_<br />

~ o<br />

o<br />

r_<br />

4- CE<br />

o<br />

0<br />

c"<br />

~’~ 0<br />

o o<br />

°,4<br />

r- ~ W<br />

o<br />

03 o .,-4<br />

~ o .,-4<br />

~ 0 I--<br />

.~..4<br />

,-4 .C: 0<br />

0 -~ 4-<br />

><br />

°,4 0 F7<br />

0<br />

°,4 0<br />

I<br />

I<br />

I<br />

I<br />

I I I<br />

I<br />

-131-


¯ O0 O0 ¯ O0 ¯<br />

O0 O0 0000 ~000 ¯ ¯ ¯<br />

¯ O’ ¯<br />

¯<br />

¯<br />

¯ ¯ ¯ O0 ¯ ¯ ¯<br />

¯ O0 ¯ ¯ ¯ O0 ¯<br />

¯ ¯ ¯<br />

¯ ¯ O0 ¯ ¯ ¯ ¯<br />

¯ ¯ ¯ 000 ¯ ¯<br />

¯ ¯ ¯ gOD ¯ ~O~OOOOO<br />

I<br />

¯ OOO ¯ go ¯ ¯ OO go ¯ ¯<br />

¯ ¯ ¯ O0<br />

¯ O0 OO0 ¯ O0 ¯ OOOOOO0<br />

¯ ¯ O0 ¯ ¯ OO0 ¯ OO000000<br />

¯ O0 ¯ O000 ¯ 000 ¯ ~O000000<br />

¯ ¯ ¯ OO00 OO0 000 O000 ¯<br />

l<br />

¯<br />

io o ~t ¯ ¯ o o ¯ ¯ ¯ ¯ ¯ ¯ ¯ ¯ ¯ ¯ ¯<br />

¯ ¯ ¯ ¯ ¯ ¯ ¯ ¯<br />

¯ ¯ ¯ ® ¯<br />

¯ ¯ ¯ ¯ ¯<br />

O0 i0 O0 ¯ ¯ O0 O0 OO0000<br />

¯ ¯ ¯<br />

O0 00000 ¯ OO0@O0000 ¯<br />

O0 OO0 ¯ I O000 ¯ ¯ ¯ O00~O0000<br />

DO OO OO ¯ ¯ OO0 ~ OOOO0


Z<br />

O_<br />

(11<br />

m<br />

0<br />

0<br />

H<br />

-134-


-135-


-].36- . .......


LEVEL<br />

p.n.<br />

¯<br />

PPNx..-<br />

O.x ............. ,x<br />

VAN<br />

~..,~ Illlllll!OOx ......<br />

¯<br />

¯<br />

x..x llllilllilOOx ...... ~<br />

x..x IIIIIIIIillO~ ...... ~<br />

~... Z~. Zo¢<br />

x.x IIIIIIIl!lll 0~, ...... x<br />

__<br />

1111<br />

¯ o ¯<br />

x.x l|Illl IIiIII IIIOxxx<br />

1111111<br />

-137-


-138-


X. 7..5"<br />

!<br />

CALl-<br />

CALL<br />

CALL /<br />

(_kLL.<br />

P~oTOCoL.<br />

I ....<br />

CoHT’~H~E<br />

ONLY LJfl£H<br />

-13 9-


-140-


PDN-.Te s t s:<br />

Zone 2 (Europe):<br />

Germany: Fern Un ~ver’s ~y of H a g e n<br />

GMO, S~ ¯ August ~n (OFN-Gatieway)<br />

Un~ Oor ~mund (UUCP-Gateway)<br />

Un i Kar lsruhe (BEL wO<br />

Un i S~u~gart<br />

(BE:L~O)<br />

Austria: Un~vers ity of Sa lzburg<br />

Finland: Univers ity of He ls ink :i (NOROUNET)<br />

I Ea ly: CNUCE ?<br />

Norway: NTARE ?<br />

Sweden: SlCS (N<br />

OK:<br />

Portsmo<br />

UCL ?<br />

(NOROUNET)<br />

OROUNET)<br />

u~h Polytechnic<br />

Zone 3<br />

USA:<br />

(North America)<br />

BBN, Cambridge, MA<br />

CISCO, Menlo Park,<br />

ISI ?, Los Angeles,<br />

PROTEON,<br />

SRI, Nenlo Park, CA<br />

SUN, ~ountain View,<br />

CA<br />

CA<br />

CA<br />

Zone 4 (Asia)<br />

Israel ?, Japan<br />

Zone 5 (Pacif ic) :<br />

Australia: CSIRO<br />

Indonesia: LAPAN<br />

,<br />

Zone 7 (South<br />

Argentinia ?,<br />

Amer ~ca)<br />

Brasilia<br />

Rokltansky/FernUnl Hagen, FEB 1989<br />

-141-


-142-


Performance and Congestion Control<br />

Chairperson: Allison Mankin/Mitre<br />

CHARTER<br />

Description<br />

of Working Group:<br />

The charter of the IETF Performance and Congestion Control<br />

Working Group is to collect and develop short-term<br />

techniques for improving <strong>Internet</strong> performance, methods which<br />

like TCP Slow-start are retrofittable and inexpensive to<br />

implement. After a preliminary draft of a white paper<br />

documenting such performance enhancements for hosts and<br />

gateways, it was decided to sharpen the focus and divide tlhe<br />

material into two papers.<br />

One of the resulting papers is the RFC on gateway congestion<br />

control policies and algorithms. The intent of this paper<br />

is to present what is now known about the difficult problem<br />

of avoiding congestion in <strong>Internet</strong> gateways. It describes<br />

proposed policies such as Random Drop, Congesti,~n<br />

Indication, and Fair Queuing, and sketches ground-rules for<br />

their adoption. An additional goal of the paper (achieved<br />

during the writing) is to generate dialogue on longer-term<br />

<strong>Internet</strong> gateway performance problems.<br />

The other paper is an RFC on TCP performance. This<br />

describes TCP algorithms such as Retransmit Backoff,<br />

Slow-start, Nagle (Small-Packet Avoidance), and Delayed Ack,<br />

as well as their correct interaction. The scope is to<br />

expand the treatment of TCP performance found in the Host<br />

Requirements RFC.<br />

-144-


Performance and Congestion Control Working Group<br />

Chairperson: Allison Mankin/Mitre<br />

STATUS UPDATE<br />

1. Chairperson: Allison Mankin/mankin@gat.eway.mitre. org<br />

Name of WG Mailing List(s):<br />

ietf-perf (-request) @gateway. mitlre, org<br />

3. Date of Last Meeting: Cocoa Beach April 11-14, 1989<br />

4. Date of Next Meeting: Stanford IETF in July<br />

5. Pending or New Objectives:<br />

The other objective of the group is the TCP Performance RFC.<br />

This is in rough draft state at this point, but the hope is<br />

to complete its good draft by the July meeting.<br />

6. Progress to Date (e.g., documents produced):<br />

Gateway Congestion Control Policies<br />

We are closing in on completion of the RFC on gateway<br />

congestion control--the next revision (ready mid-May)<br />

will be placed in the IETF-DRAFTS directory for review<br />

by the IETF at large, and the contents will be<br />

presented in full at the July plenary.<br />

-145-


Performance and Congestion Control<br />

Chairperson: Allison Mankin/Mitre<br />

CURRENT MEETING REPORT<br />

Reported by Allison Mankin/Mitre<br />

AGENDA<br />

ATTENDEES<br />

9-1 Tue: TCP Sub-Group<br />

2-5 Tue: GW Draft (Open)<br />

9-5 Wed: GW Draft (Members)<br />

Art Berggreen<br />

David Borman<br />

Noel Chiappa<br />

Mike Karels<br />

John Lekashman<br />

Charles Lynn<br />

Allison Mankin<br />

Matt Mathis<br />

Bill Nowicki<br />

Bruce J. Schofield<br />

John Scott<br />

Bill Westfield<br />

art@sage.acc.com<br />

dab@cray.com<br />

jnc@ics.mit.edu<br />

karels@berkeley.edu<br />

lekash@orville.nas.nasa.gov<br />

clynn@bbn.com<br />

mankin@gateway.mitre.org<br />

mathis@faraday.ecc.cmu.edu<br />

nowicki@sun.com<br />

schofield@edn-vax.dca.mil<br />

scott@dg-rtp.dg.com<br />

billw@cisco.com<br />

MINUTES<br />

TCP Performance<br />

The TCP Sub-group met in Cocoa Beach to get organized and agree<br />

on the scope and orientation of the TCP Pelrformance paper. We<br />

agreed that the paper will expand on the Host Requirements RFC<br />

treatment of algorithms such as Retransmit Backoff, Slow-start,<br />

Nagle Small-Packet Avoidance, and Delayed Ack, and their correct<br />

interaction. It will be ancillary to the Host RFC;<br />

particular, it will support the Host RFC’s Musts, Shoulds and<br />

Mays.<br />

A list of topics for scope had been generated by going through<br />

RFC-793 and the Host Draft. The group marked these according to<br />

our sense of the state of knowledge: Y if well understood, M if<br />

incompletely understood. We defined N for not understood, but<br />

only used it for Type of Service, because it seems orthogonal to<br />

TCP performance.<br />

TCP Performance<br />

RFC Topics<br />

Certainty<br />

Maximum Segment Size<br />

TOS<br />

Precedence<br />

Connection Establishment<br />

Management of TCBs<br />

M<br />

N<br />

M<br />

Y<br />

Y


Page 2<br />

Performance and Congestion Control<br />

TCP Performance RFC Topics (chart con’t from pg i)<br />

Connection Reuse Y<br />

PUSH<br />

Y<br />

Sender Silly Window Avoidance<br />

Y<br />

Nagle Small Packet Avoidance<br />

Y<br />

Slow-start Congestion Avoidance Y<br />

Relationship of Nagle S.-S Y<br />

RTO Calculation<br />

Y<br />

Rxt Amount<br />

Y<br />

Rxt Backoff<br />

Y<br />

Response to Source Quench Y<br />

Window Upper Limits<br />

M<br />

Zero-window SWS Cant--Send State M<br />

Receiver Silly Window Avoidance Y<br />

Out-of-order Processing Y<br />

Delayed ACK<br />

Y<br />

Piggy-back ACKs M<br />

Application-TCP Interface Y<br />

Fairness Among Connections Y<br />

Interface of TCP to IP M<br />

Fair Processor<br />

Y<br />

Connection Instrumentation Y<br />

Extended Window Option Y<br />

High-Speed Implementation Techniques M<br />

Off-board Issue M<br />

Certainty<br />

Many of the attendees took action items to be responsible for<br />

topics. For quite a few of the topics, the members of the<br />

sub-group local to Washingtont D.C. wrote drafts already, and<br />

these will be distributed.<br />

Gateway Congestion Control<br />

The rest of the working group time in Cocoa Beach was devoted to<br />

the Gateway Congestion Control Policies paper, now nearing<br />

release to the IETF. At the January meeting we had decided to<br />

recommend Random Drop in the paper. We revised the paper during<br />

the interim so that it detailed the RD policy more and gave it a<br />

fairly caveated recommendation (stating that experimentation was<br />

needed before any algorithm would be descrilbed).<br />

The paper stimulated some comment. Lixia Zhang and Eman Hashmen<br />

(MIT) separately.did simulation experiments on RD. Scott Shenker<br />

(Xerox PARC) did some analysis of RD as a sideline to a paper<br />

is writing on. game theory and gateway performance. All three<br />

have ongoing work on gateway congestion control algorithms that<br />

derive from Fair Queueing.<br />

-147-


Page 3<br />

Performance and Congestion Control<br />

Chuck Davin gave an informal presentation of the MIT results on<br />

Tuesday afternoon. Scott’s insights were offered in a long mail<br />

message, which was distributed to the working group.<br />

A bottom-line<br />

summary of the studies:<br />

RD as congestion control (choose random packet to drop instead .of<br />

first or last on queue) is uncontroversially viewed as a win.<br />

With RD, non-cooperating TCP gets excessive bandwidth at the<br />

expense of Slow-start connections.<br />

RD (and other policies) give too much control feedback "to<br />

connections whose RTTs (paths) are longer than others sharing the<br />

resource. Host-pair state as in FQ or SF (DEC Selective<br />

Feedback) is one cure.<br />

Random Drop will remain at the center of the paper, but with<br />

explication of the performance problems it handles well and of<br />

its limitations. Its good properties for control (at queue<br />

overflow) will be made clearer. We will expand the sections on<br />

other policies and make a number of other changes suggested by<br />

the ten or so non-member reviewers who read the draft this time<br />

(and whom we thank wholeheartedly). Some of these changes are:<br />

Clarify distinction between congestion control and<br />

avoidance.<br />

Expand RD congestion control vs. RD congestion avoidance.<br />

Present the components of control system (congestion<br />

detection, feedback method, feedback selection).<br />

Survey congestion detection methods.<br />

In RD CA, constant and adaptive probability of drop.<br />

Survey the time constants identified for gateway<br />

performance, i.e. the interval used for averaging in<br />

congestion detection.<br />

These changes are not as onerous as they sound. The paper will<br />

be redistributed in mid-May. At the same time, it will become an<br />

IETF-DRAFT. We will try for an interim meeting, perhaps, despite<br />

it not being great for everyone, on the day before INARC (May<br />

31)<br />

Some follow-on studies will be going on. One that came out of<br />

Cocoa Beach: at the open meeting on Tuesday, Rick Boivie and<br />

Yakov Rekhter offered to set an RT instrumented by Van into the<br />

NSSs to allow characterization of the time constants of backbone<br />

gateways,<br />

-148-


-149-


Point-to-Point Protocol Working Group<br />

Chairpersons: Drew Perkins/CMU and Russ Hobby/UC Davis<br />

CHARTER<br />

Description<br />

of Working Group:<br />

The working group is defining the use of serial lines in<br />

data networks. While the main intent is to standardize the<br />

connection of IP networks over point-to-point links, the<br />

protocol is being designed to be extensible to other network<br />

protocols as well. The protocol will provide the capability<br />

of establishing the link parameters, authentication, link<br />

encryption, link testing, as well as control of the link<br />

while it is up. The protocol will also allow configuration<br />

and control of the higher level protocols such as IP, OSI,<br />

802.3 bridging, and others.<br />

Specific Objectives :<br />

The main objective of the workgroup is to produce an RFC<br />

defining the protocol for the link and IP levels.<br />

Estimated Timeframe for Completion:<br />

The final draft of the RFC will be completed for the Fall 89<br />

IETF Meeting.<br />

-150-


Point-to-Point Protocol Working Group<br />

Chairpersons: Drew Perkins/CMU and Russ Hobby/UC Davis<br />

STATUS UPDATE<br />

i. Chairpersons:<br />

Russ Hobby, University of California - Davis,<br />

rdhobby@ucda~vis, edu<br />

Drew Perkins, Carnegie Mellon University,<br />

dpp @ andrew, cmu. edu<br />

¯<br />

¯<br />

¯<br />

¯<br />

WG Mailing lists: ietf-ppp@ucdavis.edu - main mail list<br />

ietf-ppp--request@ucdavis, edu - requests<br />

for addition to Joist<br />

Last meeting: Cocoa Beach, April 1989<br />

Next meeting: Stanford, July 23-24, 1989<br />

Pending or New Objectives:<br />

Produce RFC on protocol definition, final draft expected<br />

Fall 89, :[ETF meeting.<br />

o<br />

Progress to date (e.g., documents produced):<br />

o Requirements for a Point-to-Point Protocol, Perkins<br />

September 1988.<br />

o Complete protocol definition of link configuration and<br />

control¯ Definition of IP c.onfiguration and control<br />

being finished¯<br />

--151-


Point-to-point Protocol Working Group<br />

Chairpersons: Russ Hobby/UC Davis and Drew Perkins/CMU<br />

CURRENT<br />

Reported<br />

MEETING REPORT<br />

by Russ Hobby<br />

I. Introduction<br />

The PPP WG met on April Ii and 12. The work group plans to have<br />

the current work written up and have one or two video conferences<br />

before, the next IETF meeting.<br />

Work was continued from where it was left at the video conference<br />

with the decision to handle configuration of the link and upper<br />

level protocols separately. The link must be up and ready before<br />

any of the upper level protocols can be configured and started.<br />

Once the line is up the upper level protocols may be brought up<br />

and taken down at any time. If the link goes down, the interface<br />

must inform the upper level protocols so that they may take<br />

appropriate action.<br />

The group defined the protocols and procedures to bring the line<br />

up and work was started on the control protocol t6 bring up IP.<br />

The link must be brought up by the following sequence:<br />

l®<br />

Configuration exchange - this step is not completed until<br />

a Config Ack has been both received and sent. All<br />

configuration items are assumed to be at default values<br />

until d . configuration exchange is complete<br />

o Authentication - authentication methods used are those<br />

agreed to in the configuration exchange if any.<br />

Authentication is accomplished using the PCP Authentication<br />

Protocol. A simple user/password authentication method is<br />

defined. Development of other methods is encouraged.<br />

Encryption turned on - encryption methods used are those<br />

agreed to in configuration exchange if any. Only the data<br />

fields of PPP packets are encrypted and PCP packets are<br />

never encrypted insuring the control messages can get<br />

through even if encryption methods are out of sync.<br />

Currently no encryption methods are defined.<br />

Line testing - check if line quality is sufficient to bring<br />

up upper level protocols. Suggested methods of line testing<br />

are being defined (Medin and Satz).<br />

5. Line up - ready for upper level protocols.<br />

If any control packets are received that do not conform to<br />

the sequence, the equence is restarted. At any time if a<br />

data packet, as opposed to a control packet, is received<br />

-152-


Page 2<br />

Point-to-Point Protocol Working Group<br />

for an unknown protocol or a protocol that is not up, the<br />

packet is dropped.<br />

II. PPP Control<br />

Protocol<br />

As it was reported from the last IETF meeting, HDLC is the<br />

link packet format and in the data section of the packet is<br />

a field indicating the protocol in ’the remainder of the<br />

data. One the these protocols, number 33, is the PPP<br />

Control Protocol (PCP) used to configure and control the<br />

link and upper lew~l protocols. PCP packets have a 16 bit<br />

protocol number field. After tlhe protocol field the data<br />

can used as desired for configuration and control by each<br />

protocol.<br />

0 1 2 3 3<br />

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 90 i 2 3 4 5 6 7 8 9 0 1<br />

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+--+-+-+-+-+-+o~+-+~+-+-+-+-+-+-+-+-+<br />

iprotocol (value=33) I o protocol<br />

data<br />

III. Link Control Protocol<br />

Protocol 0 of the PeP, the Link control Protocol (LCP)<br />

used to configure and control the link itself. LCP includes<br />

functions for establishing the initial configuration,<br />

determining loopback, up/down control, circuit disconnect<br />

and other functions.<br />

-.153-


Page 3<br />

Point-to-Point Protocol Working Group<br />

The PCP packet is as follows:<br />

0 1 2 3 3<br />

01234567890123456789012345678901<br />

+-+-+-+-+-+-+-+_+_+_+_+_+_+_+_+_+_+_+_+_+~+_+..+_+_+_+_+_+_+_+_+.o+<br />

I protocol (value=0) I version I type I<br />

magic number<br />

data<br />

A. Version - The version of LCP supported.<br />

B. Type - Type of LCP packet. Defined types are:<br />

1 - Configuration<br />

3 - Config Huh?<br />

5 - Version Reject<br />

7 - Terminate Request<br />

9 - NOP<br />

II- Echo Request<br />

13- Protocol Unknown<br />

2 - Config Ack<br />

4 - Config Nak<br />

6 - Type Reject<br />

8 - Terminate Ack<br />

I0- Keep Alive<br />

12- Echo Reply<br />

Magic Number - This pseudo-random number is used to<br />

uniquely identify an end of the point-to-point<br />

connection. This field is used to detect if a line is<br />

looped back to itself. Once a number is selected the<br />

same number is used for the duration for the<br />

connection. All LCP packets sent out must contain the<br />

senders magic number (See discussion on loopback<br />

detection)<br />

Do<br />

Data - Additional data associated with the packet type.<br />

LCP Packet Types<br />

lo<br />

Configuration - This packet type is sent out the<br />

line to indicate pertinent configuration<br />

information and is used to establish a connection.<br />

Receipt of a Configuration packet means that the<br />

line is being reset and restarted. Exchange of<br />

configuration packets can continue until both<br />

sides send Config Acks or one side gives up. If<br />

no response is received from the other side after<br />

a timeout period, the Configuration packet can<br />

be resent. Suggested timeout period is three<br />

seconds.<br />

-154-


Page 4<br />

Point-to-Point Protocol Working Group<br />

Configuration Items (CI) are placed in the data<br />

field of the PCP. Multiple CIs may be included in<br />

each packet. The format of a CI is:<br />

0 1 2 3 3<br />

0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1<br />

+-+-+-+-+-+-+-.+-+-+-+-+-+-+-+-4--+-+-.+-+-+-+-+-+-+-+-+-+-+-+-+-+-+<br />

length I CI type I<br />

data +<br />

a. Length - inclusive length of the CI.<br />

b. CI Type - Type number of the CI.<br />

c. Data - value or other information for the CI.<br />

CIs provide information on M~U, async character<br />

mapping, link authentication method and link<br />

encryption method. If a CI is not included in the<br />

config packet, the default is assumed. The end of<br />

the list of CIs is indicated by a zero length CI.<br />

Config Item<br />

1 - Max Receive Unit<br />

2 - Async Control Char Map<br />

3 - Authentication Type<br />

4 - Encryption Type<br />

5 - Keep Alive Parameters<br />

Bits Default<br />

16 1024<br />

32 all ones<br />

16 none<br />

16 none<br />

?? none<br />

Sync lines will accept any value for the Async<br />

Control Char Map.<br />

Config Ack - This packet type is sent in response to a<br />

configuration packet and indicates acceptance of the<br />

other ends CIs. LCP data field contains CIs of<br />

accepted configuration,<br />

o<br />

o<br />

Config Huh? -o This packet type is sent in response to<br />

a configuration packet and indicates the configuration<br />

packet contained unknown CI type(s). The LCP data<br />

field will contain the CI entries of the unknown types.<br />

Config Nak - This packet type is sent in response to a<br />

configuration packet and indicates the configuration<br />

packet contained unacceptable CIl[s). The LCP data<br />

field will contain the CI entries of the unacceptable<br />

CI(s) and may contain suggested new values.<br />

-155-


Page 5<br />

Point-to-Point Protocol Working Group<br />

5, Version Reject - This packet type is sent in response<br />

to a LCP packet of an unacceptable version. The packet<br />

will return an acceptable version number.<br />

o<br />

.<br />

Type Reject - This packet type is sent in response to a<br />

LCP packet of an unacceptable type. Any information in<br />

the LCP data field may be ignored.<br />

Terminate Request - This packet type is sent to<br />

indicate the connection is going to be terminated. If<br />

possible wait for the Terminate Ack before breaking the<br />

connection. Any information in the LCP data field may<br />

be ignored.<br />

. Terminate Ack - This packet type is sent in response<br />

a Terminate Request° Any information in the LCP data<br />

field may be ignored.<br />

NOP - This packet type may be used to send non-LCP<br />

related data on the line, such as modem control<br />

information. When received the packet will be<br />

discarded.<br />

10. Keep Alive Parameters - To be defined. Note: Both sides<br />

must agree on common parameters for keep alives.<br />

II. Echo Request - This packet type is sent requesting that<br />

an echo reply packet be returned. ~y information may<br />

be placed in the LCP data field.<br />

12. Echo Response - This packet.type is sent in response to<br />

the echo request packet. The LCP data field must be a<br />

copy the LCP data field of the request.<br />

Protocol Unknown - This packet is sent in response to a<br />

PCP packet of an unknown or unimplimented protocol. The<br />

data field contains the 16 bit value of the unknown<br />

protocol.<br />

IV. Authentication<br />

Protocol<br />

Protocol 1 of PCP, the Authentication Protocol, is used to<br />

verify the entity on the other end of the link. The<br />

authentication method agreed to in the colnfiguration<br />

exchange is the method an entity will use in verifying the<br />

other end. Each end may use a different method if agreed in<br />

the configuration phase.<br />

-156-


Page 6<br />

Point-to-Point Protocol Working Group<br />

0 1 2 33<br />

01234567890123456789012345678901<br />

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+<br />

protocol (value=l) I authentication type<br />

data +<br />

The data field may be used in any way defined by the<br />

authentication method.<br />

A simple user/password (auth type = l) method is defined<br />

here.<br />

I Auth type I operation<br />

value = 11<br />

16 bits I 8 bits<br />

I<br />

data<br />

N bits<br />

V. IP Control Protocol<br />

request I user l en I user I pass l en I pass I<br />

I value = 1 I in bytes I string I in bytes I string l<br />

I 8 bits I I 8 bits I I<br />

I ack I msg len I msg I<br />

I value = 1 I in bytes I string I<br />

I I 8 bits I I<br />

I nak I msg l en I msg I<br />

I value = 1 I in bytes I string I<br />

1 8 bits I I<br />

Protocol 35 of the PCP, the IP Control Protocol (ICP)<br />

used to configure and control the IP protocol. ICP includes<br />

functions for establishing the initial configuration, taking<br />

down the protocol and other functions. The ICP packet<br />

format is as follows:<br />

0 1 2 33<br />

012345678901234:56789012345678901<br />

+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+--+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+<br />

protocol (value=35) I version I type<br />

data +<br />

-.157-


Page 7<br />

Point-to-Point Protocol Working Group<br />

Version - The version of ICP supported.<br />

So<br />

Type - Type of ICP packet.<br />

1 - Configuration<br />

3 - Config Huh?<br />

5 - Version Reject<br />

7 - Terminate Request<br />

9 - NOP<br />

Defined types are:<br />

2 - Config Ack<br />

4 - Config Nak<br />

6 - Type Reject<br />

8 - Terminate Ack<br />

The ICP functions above work the same as for their<br />

counterparts in the LCP section. The CIs for~ICP are:<br />

Configuration Item<br />

i. Addresses<br />

2. Compression Method<br />

Bits<br />

Default<br />

?? none<br />

?? none<br />

IP Address Negotiation<br />

On Init<br />

Send REQ w/ my IP addr or 0 if unknown°<br />

Receive ACK w/ both addresses (1)<br />

Receive NACK. Can retry REQ w/ a different address.<br />

On Recv REQ<br />

Remote addr set if likeremote addr then ACK w/both<br />

addresses else NACK<br />

Remote addr not set pick an appropriate remote addr and<br />

ACK w/ both addresses.(2)<br />

Note i: If remote addr is 0 then ignore it. He’ll be<br />

soon asking you to set it so remember it then.<br />

Note 2: If have no idea what to pick (such as both<br />

ends ask each other end for its address) then give<br />

defaults, 127.0.0.X for one with smaller magic number<br />

and 127.0.0.X+I for one with larger. There is<br />

discussion if the net 127 address is reasonable and<br />

what the value of X should be.<br />

-158-


V<br />

-159-


-160-


ST and Connection IP Working Group<br />

Chairperson: Claudio Topolcic/BBN<br />

CHARTER<br />

Description<br />

of Working Group:<br />

Define the next version of the ST protocol, explore future<br />

connection oriented internet protocol, use the former as a<br />

testbed to perform experiments in support of the latter.<br />

Specific Objectives :<br />

Produce a new specification of ST<br />

Produce a specification of a next generation connection<br />

oriented protocol<br />

Estimated Timeframe for Completion:<br />

a)<br />

b)<br />

Produce a new specification of ST. (2-3 months)<br />

Produce a specification of a connection oriented<br />

protocol. (6-12 months)<br />

-162-


ST and Connection IP Working Group<br />

Chairperson: Claudio Topolcic/BBN<br />

STATUS<br />

UPDATE<br />

1. Chairperson: Claudio Topolcic, BBN Labs, topolcic@bbn.com<br />

2. Name of WG Mailing List(s): cip@bbn.com<br />

3. Date of Last Meeting: April 12, Cocoa Beach Florida<br />

4. Date of Next Meeting: July 25, Stanford<br />

5. Pending or New Objectives: none<br />

6. Progress to Date (e.g., documents produced)<br />

o Internal draft of ST Specification<br />

o Numerous e-mail messages describilng issues in<br />

connection oriented protocols<br />

___ -163--


St and Connection IP Working Group<br />

Chairperson: Claudio Topolcic/BBN.<br />

CURRENT MEETING REPORT<br />

Reported by Steve Casner/ISI and Claudio Topolcic/BBN<br />

AGENDA<br />

ATTENDEES<br />

Characterize applications<br />

Define functions of the internet layer<br />

Identify implications on underlying networks<br />

ST- discuss a number of issues we had not yet agreed to<br />

Ross Callon<br />

Steve Casner<br />

Danny Cohen<br />

Phil Draughon<br />

Phil Park<br />

Zaw-Sing Su<br />

Claudio Topolcic<br />

Paul Tsuchiya<br />

callon@erlang.dec.com<br />

casner@isi.edu<br />

cohen@isi.edu<br />

jpd@accuvax.nwu.edu<br />

ppark@bbn.com<br />

zsu@sri.com<br />

topolcic@bbn.com<br />

tsuchiya@gateway.mitre.org<br />

MINUTES<br />

The working group held two meetings, which correspond to the<br />

two tracks we are pursuing. The meeting held during the day<br />

9f ’ Wednesday 12 April covered the high level and long term<br />

issues of connection oriented internet protocols. A second<br />

meeting was held in the evening of 12 April. It covered a<br />

number of short term issues that need to be discussed to<br />

finalize the ST specification.<br />

COIP Meeting of April 12, 1989:<br />

Phil Park~gave a presentation on Application<br />

Characterization, following the message he sent out.<br />

Applications are characterized by a list of parameters:<br />

packet size, packet rate, etc. We are calling these the<br />

"Quality of Service" (QOS) parameters.<br />

Danny proposed an additional parameter indicating how long a<br />

connection is expected to last; e.g., for’ FTP, saying how<br />

long the file is, or for a teleconference, how long it will<br />

run. It’s not clear just how this will be used. Perhaps we<br />

need only two values: short (transient, don’t count it),<br />

and long. If only two values are necessary, then it was<br />

argued that the "transient" transfer is equivalent to<br />

datagram service and could be supported by a datagram<br />

internet layer rather than a connection oriented internet<br />

layer.<br />

-164-


Page 2<br />

ST and Connection<br />

IP Working Group<br />

Although the problem of resource management in the network was<br />

not discussed, a possible use of this information is the<br />

following. We can imagine that the management might occur on<br />

several levels. Part of that management might be scheduling of<br />

resources on a time scale of tens of minutes .to hours. If we<br />

want to establish a connection for a teleconference, and. can<br />

specify that the teleconference is to last two hours, we might<br />

want the connection to be refused if my resources are going to be<br />

preempted by a higher-priority teleconference that has been<br />

scheduled to begin in five minutes. Or, we might want a<br />

different route to be chosen if such a conflict is encountered<br />

and an alternate route is possible. (If automatic rerouting with<br />

minimal disruption is possible, then maybe we don’t have to care<br />

about this route choice initially.) This sc.enario presupposes<br />

scheduling protocol which is likely to be outside the scope of<br />

the connection oriented internet layer as we envision it now.<br />

However~ if scheduled connections are to be considered, then<br />

there must be some interaction between the scheduling mechanism<br />

and the connection establishment meclhanism. Also a network’s<br />

decision to accept a connection may ibe based on administrative<br />

policies. Those policies may allow use of a network as long as<br />

you don’t hog it. The duration of a teleconference or the size<br />

of a file transfer would be one measure to be considered in such<br />

a policy.<br />

There are some parameters that applications give to nets, and<br />

some vice versa. Steve asserts that it’s best to have full<br />

information transfer both ways so that nets can make decisions<br />

based on the information when they care. There’s not much<br />

penalty in providing too much information.<br />

Some of the parameters that stimulated discussion are the<br />

following:<br />

Bandwidth -- don’t want a linear scale°<br />

Packet size -- Danny proposed that the network should report<br />

back the maximum packet size available along the complete<br />

path, rather than having the application say what packet<br />

size it wants. BUT -- the Wideband Network, for example,<br />

needs to know the size packets to be sent in order to<br />

efficiently allocate a stream to match° It was agreed that<br />

once a connection was established, the maximum packet size<br />

along that route could be reported to ~the application to<br />

provide it some flexibility.<br />

Reliability -- need only a few choices: perfect, a lot, a<br />

little, don’t care. This is true unless you are really<br />

controlling something like coding, then you need enough bits<br />

to specify the range of control settings. Ross suggested we<br />

select levels that whose results we can understand,<br />

specifically:<br />

--165-


Page 3<br />

ST and Connection<br />

IP Working Group<br />

i)<br />

2)<br />

3)<br />

~)<br />

The reliability supplied by TCP to an application.<br />

The reliability over which TCP works efficiently.<br />

The reliability across which voice works well.<br />

The reliability over which TOP will collapse.<br />

Don’t care.<br />

Delay -- this is a "softer" requirement than bandwidth. We<br />

couldn’t figure out how an agent could guarantee a given delay,<br />

nor what it should do if it could not meet it.<br />

Security -- may affect routing decisions, or processing load in<br />

agents if they have to decrypt headers, but for real security,<br />

applications don’t get a choice, so there may be no point in<br />

including this parameter. Security should be supported by SDNS.<br />

Burst factor -- this should be covered in the rate parameters if<br />

they are rich enough to describe the distribution. Later, we were<br />

not so sure, and considered a "leaky bucket ’u parameter, i.e., how<br />

big does the bucket (buffer) have to be to avoid overflowing<br />

given an outputat the bottom with a flow at the average rate.<br />

Danny suggested that we have shorthand codes for various traffic<br />

types. This was based on the observation that in NVP-II we had a<br />

full set of parameters but.only ever used the "vocoder codes"<br />

that were a shorthand for the full set. Steve suggests the<br />

reason is that we never did vocoder experimentation over the net;<br />

we experimented in the lab, then used completed vocoders over the<br />

net. For application characterization, the con~unication of<br />

parameters is not between peers, but between layers. Steve<br />

suggests there will beta wider variety of applications, and that<br />

at least some parameters will require numerical adjustability if<br />

a shorthand is defined.<br />

Danny suggested that each packet could carry a priority<br />

specification. Then the high priority packets would be processed.<br />

first. Ross suggested an alternate approach, in which a<br />

connection would have a priority, and this priority would be used<br />

as input to the decision to accept, reject or pre-empt that<br />

connection. It would be the entire connection, not any given<br />

packet that would be deleted. This approach was more popular<br />

among the attendees. This discussion brought out two interesting<br />

questions. In times of congestion, should a connection be singled<br />

out and pre-empted, or should packets from a number of<br />

connections be dropped without pre-empting any given connection,<br />

and how would the connections be selected? Second, how it could<br />

be decided that the requirements of an established connection<br />

could no longer be met and that connection should be pre-empted?<br />

Neither of these issues were resolved.<br />

Nevertheless, allowing packets in a connection to have different<br />

priorities supports a single application that carries data of<br />

different priorities. This would be the case if we are using a<br />

layered coding scheme where lower priority layers get discarded<br />

-166-


Page 4<br />

ST and Connection IP Working Group<br />

if there is congestion. If this were done with separate<br />

connections each with its own fixed priority, that could cause<br />

problems with synchronization. We did not resolve this issue.<br />

We discussed how the values of these parameters would be arrived<br />

at. There can easily be flexibility in what an application can<br />

accept. Possible reasons include a) in many applications packet<br />

size and packet rate can be traded off and so long as they<br />

represent the same bandwidth, since many applications only care<br />

about bandwidth, b) some applications can transmit , comparable<br />

data at different bandwidtlhs, such as when using multiple rate<br />

voice coders, or c) some applications, such as file transfer, can<br />

adapt their behavior to offer different bandwidths. Therefore, it<br />

is reasonable to assume that there can be a negotiation of these<br />

parameters between the application and the network layer.<br />

In negotiating packet rate and packet size, there are two<br />

distributions to consider: l) the range ower which the<br />

application can operate (its adjustability)~ and 2) the range<br />

over which it varies as it operates (for variable-rate coding<br />

schemes). For (i), the application would want to give<br />

values, what it needs (min) and what it wants (max). For (2),<br />

variable rate application would want to specify the average rate<br />

(what it wants to pay for) and the peak rate it wants the network<br />

to handle. Specifying ranges of average and peak values won’t<br />

work because the network can’t "tell what value of peak goes with<br />

a given choice of average (or vice versa). Instead it might<br />

better to give a list of (avg,peak) pairs; each pair would<br />

specify a range of type (2), while the collection of pairs would<br />

specify the range of type (i). However, there is a problem, the<br />

packet rate and packet size are related; either might be fixed<br />

while the other changes (either for adjustability or<br />

variability). So, it might be necessary to specify a list of<br />

quadruples: (avg rate, peak rate, avg size, peak size) where<br />

avg=peak for at least one of rate or size.<br />

The parameters<br />

list that ~we arrived at is the following:<br />

Bandwidth - (avg pkt rate, peak pkt rate, avg pkt size, peak pkt<br />

size)<br />

Delay - (maximum tolerable at some percentile, some indication<br />

of acceptable distribution, flag to allow discard)<br />

Reliability - (some small number of values)<br />

Discard option - (newest or oldest)<br />

Total duration of transfer - (?)<br />

Burst factor o- (?)<br />

We finally decided that we need to look at what the network will<br />

do with this information before we can say much more about the<br />

negotiation process. We decided that the next step should be to<br />

talk about the network layer and we should then come back and<br />

take another pass at characterizing the applications and defining<br />

the negotiation procedure.<br />

-167- ___


Page 5<br />

ST and Connection IP Working Group<br />

ST protocol specification meeting of 12 April 1989<br />

ATTENDEES<br />

Steve Casner, Danny Cohen, Phil Draughon, Phil Park, and<br />

Claudio Topolcic<br />

We met for a few hours the same evening. We reached a number of<br />

decisions and agreed not to decide on a number of other issues.<br />

DECISIONS<br />

We reviewed Steve Casner’s proposal for doing encapsulation of ST<br />

packets in IP for the purpose of sending the ST packets across<br />

IP-only parts of the <strong>Internet</strong>. We approved it. In this<br />

technique, an IP header is placed in front of an ST packet and<br />

the IP destination is set to be the IP address of the next ST<br />

agent along the ST connection’s route. This is used when the best<br />

route includes passing through gateways that do not support ST.<br />

Since the IP-only gateways and networks cannot perform resource<br />

management, we assume that this will only be the case when that<br />

IP-only part of the <strong>Internet</strong> is only lightly loaded.<br />

Danny suggested using this IP encapsulation technique for all ST<br />

packets. Again, the IP destination would be the IP address of<br />

the next ST agent, even if that agent is the next gateway in the<br />

path. ST agents would still perform all the resource management<br />

functions they would if the packets were not so encapsulated.<br />

The motivation would be to take advantages of security<br />

implemented for IP as part of SDNS, or other services provided<br />

with IP. Everyone was intrigued, but we. weren,t convinced that<br />

this would be of enough benefit. We did not accept this view at<br />

this time. We agreed that it is not mandatory for the new ST<br />

specification to maintain the same interface with the next higher<br />

protocol layer as current ST. However, changes should be based on<br />

sound reasoning. Specifically, we may cause the next higher layer<br />

to need to have more information than current ST does. Phil<br />

Draughon offered to look into the requirements of the next<br />

protocol layer.<br />

We agreed that we will need to write more specification documents<br />

than just the ST spec we are currently working on. We need to<br />

describe things like the interface between the ST layer and the<br />

next higher layer in a host, and the routing algorithm that will<br />

be used.<br />

We agreed that adding new control messages to ST is acceptable,<br />

but only as long as the new ones have a different and distinct<br />

function.<br />

We decided to get rid of the ST.DG bit.<br />

-168-


Page 6<br />

ST and Connection IP Working Group<br />

We agreed that a source route option would be a good idea, and<br />

thought it would be relatively easy to implement, though we did<br />

not decide on a mechanism.<br />

We agreed with Danny’s proposal that security be provided by<br />

SDNS. IP encapsulation will be necessary to allow this.<br />

NO DECISION<br />

REACHED<br />

We talked about the impact of what we are doing with the<br />

conferencing part of ST on the point to point part of ST. We<br />

could try to not force any changes on the point to point ST, we<br />

could make only the obviously necessary changes, such as using a<br />

consistent Flow Spec, or at the other extreme, we could eliminate<br />

point to point ST altogether. Making point to point ST be simplex<br />

is equivalent to eliminating it.. We did not make a decision<br />

because nobody had a particularly strong opinion.<br />

We talked about the possibility of changing the route of an<br />

established connection, but we decided this was hard and we would<br />

postpone a decision.<br />

We agreed that aggregation will be useful, and also agreed that<br />

it will be hard to specify and implement. We did not discuss how<br />

to do it.<br />

We discussed whether a field would be needed that specifies the<br />

next protocol above ST. Such a field exists~ it is the extension.<br />

However, we did not agree how that field should be interpreted.<br />

An obvious possibility is to partition the space and assign<br />

different parts to different protocols.<br />

Somebody suggested adding a flag, and function, that causes the<br />

reverse path of a (conference) connection to be built<br />

automatically, in essence allowing conferencing connections to be<br />

full omniplex. We decided to table this idea for now.<br />

We did not discuss<br />

routing.<br />

-169-


-170-


TELNET Working Group<br />

Chairperson: Dave Borman/Cray<br />

CHARTER<br />

Description<br />

of Working Group:<br />

The TELNET working group is to look at RFC 854, "Telnet<br />

Protocol Specification", in light of the last 6 years of<br />

technical advancements, and determine if it is still<br />

accurate with how the TELNET protocol is being used today.<br />

This group will also look at all the numerous TELNET<br />

options, and decide which of them are still germane to<br />

current day implementations of the TELNET protocol.<br />

Specific<br />

Objectives:<br />

Either re-issue RFC 854 to reflect current knowledge<br />

and usage of the TELNET protocol, or issue a companion<br />

RFC to update and expand on fuzzy areas of RFC 854.<br />

Create or update RFCs for TELNET options to clarify or<br />

fill in any missing voids in the current option set.<br />

(Most noteably, some method to allow automatic user<br />

authentication is needed).<br />

~ Act as a clearing house for all proposed RFCs that deal<br />

with the TELNET protocol.<br />

o When the above objectives have been met, go dormant,<br />

and will be re-activated as needed to fullfill the<br />

objective of being a clearing house for future<br />

extensions to the TELNET protocol.<br />

Estimated Timeframe for Completion:<br />

Estimates will be determined after the first meeting.<br />

-172-


TELNET Working Group<br />

Chairperson: David Borman/Cray<br />

STATUS UPDATE<br />

i. Chairperson: Dave Borman~ dab@cray.com<br />

2. WG Mailing List(s): telnet-ietf@cray.com<br />

(Subject to change..°)<br />

3° Date of Last Meeting: New Group<br />

4. Date of Next Meeting: July 1989 at Stanford<br />

5. Pending or New Objectives: see Charter<br />

6. Progress to Date (e.g~, documents produced):<br />

none<br />

CURRENT MEETING REPORT<br />

none<br />

-173-


USER-DOC Working Group<br />

Chairpersons: Tracy LaQuey/Univ of Texas and Karen Roubicek/NSF<br />

CHARTER<br />

Description of Working Group:<br />

The USER-DOC Working Group will prepare a bibliography of on-line and hard<br />

copy documents/reference materials/training tools addressing general<br />

networking information and "how to use the <strong>Internet</strong>". (Target audience:<br />

those individuals who provide services to end users and end users<br />

themselves.)<br />

Specific<br />

Objectives:<br />

Io Identify and categorize useful documents/reference materials/training<br />

tools.<br />

2o Publish both an on-line and hard copy of this bibliography.<br />

3o Develop and implement procedures to maintain and upda~e the<br />

bibliography. Identify an organization or individuals to accept<br />

responsibility for this effort.<br />

As a part of the update process, identify new materials for inclusion<br />

into the active bibliography.<br />

5o Set up procedures for periodic review of the biblio by USWGo<br />

Estimated Timeframe for Completion:<br />

- Format for the bibliography will be decided upon by the<br />

July IETF session, as well as identification of "sources of<br />

information" (e.g. individuals, mailing lists, bulletins, etc.)<br />

- Draft bibliography will be prepared by mid-December 89.<br />

-174-


USER-DOC Working Group<br />

Chairpersons: Tracey LaQuey/Univ of Texas and Karen Roubicek/NSF<br />

STATUS UPDATE<br />

io Chairpersons: Tracy LaQuey / tracy@emx.utexasoedu<br />

Karen Roubicek / roubicek@nnsc.nsfonet<br />

2o WG Mailing Lists: us-wg@nnsconsf.net (temporary?)<br />

us-wg-request@nnsc, nsf ~ net<br />

3° Date of Last Meeting: JVNC Supercomputer Center, Princeton NJ / 1 Jun 89<br />

4. Date of Next Meeting: July IETF meeting/10:45am - 4:00pm, 25 July 89<br />

Stanford, CA.<br />

5. Pending or New Objectives: see Current Meeting Report<br />

6o Progress to Date (e.g., documents produced):<br />

Ist formal meeting 1 Jun 89 / draft charter and objectives drawn up<br />

-i ’7 5-


USER-DOC Working Group<br />

Chairpersons: Tracey LaQuey/Univ of Texas and Karen Roubicek/NSF<br />

CURRENT MEETING REPORT<br />

Reported by Karen Bowers<br />

Several members of the USWG took the opportunity to convene a WG session<br />

during the FARNET meeting at the JVNC Supercomputer Center, Princeton, NJ<br />

on 1 June 1989. The purpose of this session was to discuss the formal<br />

formation of a distinct working group to assemble a bibliography of<br />

documents and user training tools useful to NICs, LAN managers and end<br />

users° The Agenda, outlined below, was very ambitious for the time allotted.<br />

and consequently will extend into a follow-on WG session during the<br />

upcoming IETF-meeting at Stanford University, 25-28 July 89.<br />

AGENDA<br />

ATTENDEES<br />

- Form a distinct Working Group<br />

- Write Charter and Objectives<br />

- Select the Various Categories of Documents/Info to be Included<br />

- Determine "Plan of Attack"<br />

- Identify Existing Sources of Information<br />

- Discuss in Detail Biblio Format to be Adopted<br />

Karen Lo Bowers<br />

Tracy LaQuey<br />

Martyne Hallgren<br />

Joel Maloff<br />

Karen Roubicek<br />

Don Morris<br />

Ed Krol<br />

Tom Bajzek<br />

MINUTES<br />

Accomplishments:<br />

- Karen Roubicek and Tracy LaQuey were asked to co-chair this<br />

effort as a WG (tiger team) under USWG and graciously accepted.<br />

- A draft charter was drawn up and will be further revised and<br />

presented to the IETF Chairman for comment and approval prior<br />

to the Stanford IETF in July.<br />

- Some basic requirements were identified as essential to this<br />

effort:<br />

Contacting individuals directly for their participation and<br />

biblio inputs is probably the most effective way of<br />

obtaining information, though mailing lists and bulletins<br />

will still be employed°<br />

Each listing should contain some or all of the following<br />

information:<br />

* date of document<br />

* shelf life<br />

* where to obtain and format<br />

* abstract<br />

* limitations/caveats<br />

* version #<br />

-176-


Page 2<br />

USER-DOC Working Group<br />

Non-document sources of information could be included,<br />

such as videos, available user training workshops, etc:<br />

* MCI Video on <strong>Internet</strong>ting<br />

* SIGUCCS/EDUCOM/MERIT Workshops<br />

* England Study (Source: Jim Sweeton)<br />

- Some documents have already been collected by Tracyo They are on<br />

emx.texas.edu. (The list of documents can be accessed by anonymous<br />

ftp. Cd to "user.wg/biblio" and the file is called "bibliography"°<br />

The actual documents thus far collected are in "user.wg/documents".)<br />

These documents have been placed in the following "tentative"<br />

categories:<br />

* Introductions to TCP/IP and the <strong>Internet</strong><br />

* Technical TCP/IP Tutorials<br />

* Network Administrators Tutorials<br />

* Electronic Mail Tutorials<br />

* Electronic Mail Configuration Tutorials and<br />

Reference Materials for Network Managers<br />

* Directory Services Documents<br />

* Reference Materials<br />

Interim Activity Planned:<br />

Next Meeting:<br />

Within the next several weeks, Karen L. Bowers, Tracy LaQuey<br />

and Karen Roubicek will confer via a teleconference, finalize<br />

the Charter/Objectives, and outline the specific approach to<br />

be taken in assembling the bibliography. They will also<br />

discuss the official WG name to be adopted and determine if<br />

a mailing list separate from the us-wg mailing list is<br />

necessary or counter to active WG participation.<br />

This "biblio" WG will convene at Stanford. It is essential<br />

the USWG, NISI and "biblio" WG are scheduled ~t times<br />

independent of one another to ensure essential participation<br />

in all three forums.<br />

-i 7 7-


User Services<br />

Chairperson:<br />

Working Group<br />

Karen Bowers/NRI<br />

CHARTER<br />

Description<br />

of Working Group:<br />

The User Services Working Group will identify and address<br />

critical service requirements needed by "those people who<br />

help end users" (e.g. local net managers]l and develop tools<br />

and materials to aid in the productivity of end users. The<br />

purpose is to answer the needs of the lower levels (,)<br />

within this hierarchy:<br />

Specific Objectives:<br />

NATIONAL NETWORK<br />

NET MANAGERS (NSF, DCA, ETC.)<br />

NICs/NOCs<br />

REGIONAL NET MANAGERS<br />

LOCAL NET MANAGERS*<br />

END USERS*<br />

Assemble a non-static cadre of interested experts<br />

within an open forum to exchange user services<br />

information, to share problem-solving techniques, and<br />

to select critical projects to be undertaken on behalf<br />

of the local net manager and end user.<br />

o<br />

Select projects based on production-oriented criteria.<br />

The Proj ect (s)<br />

- must lend itself to accomplishment within a<br />

reasonable timeframe<br />

- must culminate in a measurable/quantifiable end<br />

result<br />

- must address user assistance needs = be user<br />

oriented<br />

- must yield products/tools designed to be both<br />

easily maintained and updated (with built in<br />

accountability)<br />

- must not duplicate efforts (This will be<br />

pre-empted by surveying exisitng resources.)<br />

o<br />

Determine the most appropriate approach to a respectiwa<br />

project (s):<br />

produce a totally new product<br />

enhance/improve/influence an existing resource<br />

table action for future consideration<br />

¯<br />

Spin off various small WGs (tiger teams) to address<br />

very specific, short term projects (EX: NOC-Tools WG<br />

-178-


Charter<br />

Page 2<br />

and NISI WG). Once the. respective project(s) is completed,<br />

members of the tiger team(s) will reassemble within the USWG<br />

to participate in the identification of the next project(s!<br />

to be undertaken.<br />

Estimated Timeframe for Completion:<br />

Selection and completion of projects will occur on a<br />

continuous basis, with timelines established for each<br />

individual tiger team formed.<br />

-179- ¯


User Services<br />

Chairperson:<br />

Working Group<br />

Karen Bowers/NRI<br />

STATUS UPDATE<br />

lo Chairperson: Karen L. Bowers<br />

bowers@sccgate.scc.com<br />

®<br />

WG Mailing List(s): US-WG@NNSC.NSF.NET and<br />

US-WG-REQUEST@NNSC.NSF.NET<br />

Date of Last Meeting: Cocoa Beach, Fl/April 11-12, 1989<br />

~<br />

Date of Next Meeting:<br />

o NISI WG formation meeting 4 May 89 and Plenary/WG<br />

meeting Stanford University/ 25-28 .July 89<br />

o "Biblio" WG formation meeting 1 June 89 and Plenary/WG<br />

meeting Stanford University/ 25-28 July 89<br />

~<br />

Pending or New Objectives:<br />

USWG Chairman to investigate Campus Awareness via meeting at<br />

NSF with D. Vanbelleghem, SIGUCCS et al and determine if<br />

USWG should get involved.<br />

0<br />

Progress to Date (e.g., documents produced):<br />

Formation of three WGs (tiger teams): NOC-Tools, NISI WG,<br />

and a bibliography WG (not yet named); refer to the CURRENT<br />

MEETING REPORT attached<br />

-180-


User Services Working Group<br />

Chairperson: Karen Bowers/NRI<br />

CURRENT MEETING REPORT<br />

Reported by Karen Bowers<br />

AGENDA<br />

ATTENDEES<br />

Brief Intro of USWG (for new attendees)<br />

Planned USWG Organizational Structure<br />

Briefing on NOC-Tools WG (Bob Stine)<br />

Individual Briefings on AREAS FOR CONSIDERATION<br />

*Network Resources Handbook (T. LaQuey and K. Roubicek)<br />

*How to Set Up Campus NIC/NOC (T. LaQuey)<br />

*Bibliography of Documents Every NIC Should Have<br />

(M.Schoffstall and F. Perillo by e-mail)<br />

*Mailing List Management: Listserv (J. Sweeton)<br />

Other: USWG Review of DRAFT Outline for U of Texas’<br />

Directory of Computer Networks (To LaQuey and USWG)<br />

Selection of Projects to be Undertaken<br />

Joyce K. Reynolds<br />

JKREYNOLDS@ISI.EDU<br />

Jim Sweeton<br />

SWEETON@Merit.Edu<br />

Karen Roubicek<br />

ROUBICEK@nnsc.nsf.net<br />

Mary Stahl<br />

STAHL@SRI-NIC.ARPA<br />

Jose J. Garcia-Luna<br />

garcia@sri-com<br />

Robert Stine<br />

stine@sparta.com<br />

Ole Jacobsen<br />

ole@csli.stanford.edu<br />

Tracy LaQuey<br />

tracy@emx.utexas.edu<br />

Don Morris<br />

morris@ncar.ucar.edu<br />

Scott Brim<br />

swb@devvax.tn.cornell.edu<br />

Philip Almquist<br />

USC/ISI<br />

MERIT<br />

NNSC/BBN<br />

SRI/NIC<br />

SRI/NIC<br />

SPARTA<br />

ConneXions/<br />

ACE<br />

UT Austin<br />

NCAR<br />

Cornell<br />

Stanford<br />

almquist@jessica.stanford.edu<br />

Elise Gerich<br />

MERIT/NSFNET<br />

epg@merit.edu<br />

Paul Love<br />

SDSC<br />

LOVEEP@SDS.SDSC.EDU<br />

Karen L. Bowers<br />

NRI<br />

bowers@sccgate.scc.com<br />

Rebecca Nitzan LLNL<br />

nitzan@nmfecc.llnl.gov<br />

213 822-1511<br />

313 936-3000<br />

617 873-3361<br />

415 859-4775<br />

415 859-5647<br />

703 448-0210<br />

415 941-3399<br />

512 471-3241<br />

303 497-1282<br />

607 255-8686<br />

415 723-2229<br />

313 936-3000<br />

619 534-5043<br />

703 620-8990<br />

415 422-9775<br />

-’181-


Page 2<br />

User Services Working Group<br />

MINUTES<br />

After a brief review of our goals and charter the first item of<br />

discussion was the organizational structure of the USWG. Just as<br />

the members of the MIB WG have concluded, we too have determined<br />

that the USWG will be an umbrella organization from which smaller<br />

Working Groups (tigerteams) will be created to address short term<br />

projects. We have taken this one step further and have revised<br />

our Charter (provided above) to align with this structure and<br />

reflect the project management aspects of our WG activities.<br />

Bob.Stine presented a briefing on the newly formed NOC-Tools WG,<br />

one such tiger team. The thrust of NOC-Tools .is "to develop a<br />

catalog to assist network managers in the selection and<br />

acquisition of diagnostic and analytic tools (both hardware and<br />

software) for TCP/IP internets. This WG, co-chaired by Bob Stine<br />

(SPARTA) and Bob Enger (Contel), convened a separate WG session<br />

on Wednesday, 12 April 89; minutes from that meeting have been<br />

prepared and are available.<br />

Some of the AREAS FOR CONSIDERATION identified during our<br />

JAN/Austin,TX meeting (see Agenda) were researched during the<br />

spring quarter. Four of these were briefed by individual WG<br />

members and then were discussed at length by the USWG.<br />

As the discussions progressed it was evident that several<br />

distinct requirements were surfacing. The most dramatic<br />

realization was the need to define what "network information<br />

services" are and how those services overlap~differ at each level<br />

of the networking hierarchy (national/ regional/campus). During<br />

somewhat impromptu working lunch several USWG members concluded<br />

that what is needed is a requirements document addressing<br />

"network information services", to include re~irements at each<br />

level; basic/advanced/elite/(perhaps, private) services that<br />

could be made available; and how these services could be<br />

successfully interconnected as an <strong>Internet</strong>-wide Network.<br />

Information Service. The decision was made to hold a follow on<br />

exploratory meeting at NRI and invite a small group of NIC<br />

representatives. The purpose of the meeting is to define the<br />

general requirements for <strong>Internet</strong> information services and<br />

assemble that information into a network infoz~ation services<br />

requirements document. Tentative plans are for’ this requirements<br />

document to be produced by a small USWG tiger team, with review<br />

to be accomplished by the entire USWG and individual reviewers<br />

selected by the IETF Chairman. (This requirements document could<br />

conceivably be the precursor to the design of a Network<br />

Information Services Infrastructure to provide internet-wide<br />

network information services.)<br />

The second area identified for action is the creation of a<br />

bibliography useful to NICs, LAN managers, and end users.<br />

This will be an expansion of the work already done by<br />

-182-


Page 3<br />

User Services Working Group<br />

Marty Schoffstall and Francine Perillo and will include documents<br />

which answer such questions as "what is the <strong>Internet</strong>" and "what<br />

services are available (mailinglists/enhanced services)" and will<br />

provide references t~ basic information such as "how to ftp",<br />

"how to use email" and "how to set up a campus NIC/NOC". This<br />

will include a reference to the NOC-Tools bibliography andother<br />

pertinent glossaries. Bibliotext was suggested as a useful format<br />

for setting up this bibliography° The bibliography and any<br />

related on-line documents will be installed in a repository.<br />

Tracy LaQuey volunteered to act as a temporary repository until<br />

the bibliography has been produced and procedures established to<br />

maintain/update the bibliography/on-line documents. A Video<br />

Teleconference will be held on/about 2 June to further address<br />

this project and better define the "boundaries" of what should be<br />

included in this document.<br />

Finally, the issue of "campus awareness" was raised and<br />

discussed. How can information be provided campus-wide to ensure<br />

colleges/universities are aware of I) what .connectivity currently<br />

exists on their respective campuses , and/or 2) how they can<br />

connect to the <strong>Internet</strong> and what connectivity provides them in<br />

terms of enhanced research capability and information exchange.<br />

This is an area currently being addressed by MERIT EDUCOM and<br />

SIGUCCS. The USWG needs to further investigate if we should/can<br />

play a role in this user education process; should we get<br />

involved in campus "road shows"? This will be discussed further<br />

at the next IETF plenary.<br />

AREAS FOR CONSIDERATION tabled at this time (to be addressed in<br />

the future):<br />

* Network Resources Directory<br />

* How to Set Up a Campus NIC/NOC<br />

* Mailing List Management<br />

* Consolidated Common End User Questions/Answers<br />

Other action items:<br />

Ensure Ed Krol (U of IL) and Charlie Catlett (NCSA)<br />

are invited to participate in the bibliography. (K. Bowers)<br />

Personally invite all key players (identified during our<br />

first meeting) to attend the Stanford meeting and/or<br />

be placed on the USWG mailing listo (J.K. Reynolds and<br />

K.Bowers)<br />

-183-


I I i I<br />

-184-


-18 5-


VI. Network Status Briefings<br />

and<br />

Technical Presentations<br />

-186-


Everything<br />

Presented<br />

You Ever Wanted to Know About OSPFIGP<br />

by John Moy<br />

This is a short introduction to the OSPF protocol° It has been<br />

developed during the past year in the OSPFIGP working group of<br />

the <strong>Internet</strong> <strong>Engineering</strong> <strong>Task</strong> <strong>Force</strong>.<br />

OSPF is an IP routing protocol, intended to be used internal to<br />

an Autonomous System. In internet terminology, such a routing<br />

protocol is called an Internal Gateway Protocol. The OSPF<br />

utilizes SPF-based routing technology in order to find the set of<br />

best paths to each internet destination. The "O" in OSPF stands<br />

for open; it is hoped that multiple vendors will implement the<br />

protocol and interoperate.<br />

OSPF has benefitted from the existing SPF routing technology. BBN<br />

first developed an SPF-based routing algorithm for the Arpanet in<br />

the 1970s. A paper by Radia Perlman ("Fault Tolerant Broadcast of<br />

Routing Information") introduced modifications to the SPF<br />

algorithm (e.g., the lollipop-shaped sequence space and the<br />

addition of a checksum field to links state advertisements) that<br />

enabled a reduction in the amount of routing traffic, and tlhe<br />

removal of the link-up waiting time. DEC’s IS-IS proposal<br />

introduced the concept of a Designated Router which generates a<br />

link state advertisement for transit networks. Finally, BBN did<br />

some work on area routing in an SPF-based system.<br />

Based on this foundation, the OSPF working group was formed in<br />

the spring of 1988. The major features of OSPF are as follows.<br />

There is fast response to topology changes with a minimum of<br />

routing traffic. When multiple best paths are available to a<br />

destination, they are disovered and used. Separate sets of paths<br />

are possible for each IP Type of Service. A network mask is<br />

passed with each advertised destination, enabling "variable<br />

length subnet masks". Externally derived routes (e.g., EGP<br />

routes) are tagged and distributed independently from internal<br />

OSPF routes. All OSPF routing protocol packet exchanges are<br />

authenticated. Finally, OSPF protocol traffic uses IP multicast<br />

instead of broadcast.<br />

OSPF also has an area routing scheme. This is very similar to the<br />

area routing developed by BBN. In OSPF area routing, routing<br />

inside any particular area is protected from outside<br />

interference. Also, the topology of the area is invisible from<br />

outside the area (similar to an IP subnetted network). Finally,<br />

the area ID is NOT encoded into the destination addresses.<br />

Quickly, this is how OSPF works. Link state advertisements<br />

describe the local topology. Each router originates a link state<br />

advertisement, called a "router links advertisement,’. This<br />

indicates the type, cost, and state of each of the router’s<br />

interfaces, together with what the interface .attaches to (a Page<br />

-188-


Page 2<br />

Everything<br />

You Ever Wanted to Know About OSPFIGP<br />

transit network, stub network, or to another router via a<br />

point-to-point connection). Each transit network has a "network<br />

links advertisement" originated for it by the Designated Router..<br />

This link state advertisement lists the set of routers attached<br />

to the transit network. Both of these link state advertisements<br />

are flooded throughout the routing domain° The collected set of<br />

advertisements forms the routing database. This database is<br />

identical in all nodes. From this database, each node calculates<br />

a shortest path tree, with itself as the root. This calculation<br />

yields the routing table.<br />

The presence of areas modifies the above somewhat. The algorithm<br />

executes in each area as above, calculating all the intra-area<br />

routes. Area border routers (those attached to more than one<br />

area) learn routes to destinations in other areas, and transmit<br />

this learned information to tlheir attached areas by means of<br />

"summary link advertisements". This third kind of link state<br />

advertisement is also flooded throughout a single area.<br />

All area border .routers must be attached to a single area: the<br />

"backbone". The backbone transmits the "inter-area" routing<br />

information (routes between areas). The backbone must<br />

connected; all areas are attached to the backbone, forming a star<br />

topology with the backbone as hub. Areas may dedicate some of<br />

their resources to the’ backbone; this enables the maintenance of<br />

backbone connectivity through the configuration of "virtual<br />

links".<br />

External routes are described by a fourth kind of link state<br />

advertisement, "AS external link advertisements". These, unlike<br />

the previous three advertisement types, are flooded throughout<br />

the entire Autonomous System instead of just throughout a single<br />

area. These advertisments are considered last when building a<br />

routing table. The following comparisons can be made between<br />

OSPF and the DEC IS-IS proposal. Both protocols are SPF-based,<br />

and as such use many of the same mechanisms (flooding, the<br />

shortest path calculation, etc.), just as any two Ford algorithms<br />

use many of the same mechanisms (broadcast of routing tables,<br />

etc.). The main differences between OSPF and the DEC proposal cna<br />

be broken .up into SPF differences, area.routing differences, and<br />

special IP considerations.<br />

The SPF differences include the following. OSPF ensures that a<br />

router’s routing database is synchronized before the router is<br />

allowed to forward data traffic. This guards against packet<br />

looping. OSPF has made the following routing traffic reductions:<br />

on a transit networks database synchronization occurs only over<br />

OSPF adjacencies (an o(n) problem rather than o(n**2)),<br />

attempt is made to sychronize link state advertisement ages, and<br />

external routes are specified each in a separate advertisement<br />

(allowing incremental updates). OSPF allows the specification<br />

-189-


Page 3<br />

Everything<br />

You Ever Wanted to Know About OSPFIGP<br />

two types of external metric (one comparable to the link state<br />

metric, and the other larger than any link state path). Finally,<br />

OSPF has no special "link state confusion logic"; link state<br />

checksum conflicts are treated the same as sequence number<br />

conflicts.<br />

OSPF area routing looks much like the BBN area scheme, instead of<br />

the DEC IS-IS areas. The OSPF area ID is not part of the<br />

destination address. This allows the intelligent selection of<br />

exit/entry touters when routing to destination areas, and avoids<br />

the introduction of area partition repair logic (partitioned<br />

areas instead appear as two separate areas). The OSPF backbone is<br />

similar to the level two routing in the DEC IS-IS proposal.<br />

However, the OSPF backbone need not be physically connected, and<br />

may instead be connected by means of virtual links.<br />

Finally, OSPF is an IP routing protocol, while the DEC IS-IS<br />

is an ISO routing protocol. OSPF passes around native IP<br />

addresses, and provides explicit IP subnetting support. OSPF<br />

packet formats have been designed so that they can be efficiently<br />

parsed in an IP environment. The packet formats have also been<br />

designed so that IP fragmentation and assembly should not be<br />

necessary. Finally, OSPF should provide some experience with IP<br />

multicasto<br />

-190-


U<br />

| | ! !<br />

-192-


I I i<br />

-193-


I I I l I I


0<br />

U<br />

I I i


-i96-


-i97-


0<br />

~llli<br />

0<br />

U<br />

0<br />

U<br />

0 1.1.1 ~<br />

I I I<br />

I I I I<br />

-198-


-199-


"--" 4)<br />

0 0<br />

! ! ! !<br />

-200-


0<br />

HI<br />

¯<br />

ii<br />

! I<br />

-201-


I I i<br />

-202-


I<br />

i<br />

i i I I<br />

~n<br />

o<br />

u<br />

I I I<br />

-203-


The Open Routing Architecture<br />

Presented by Marianne Lepp<br />

The AS-AS routing architecture of the Open Routing Working Group<br />

has been designed for an <strong>Internet</strong> in which 10,000s of entities<br />

will participate in the routing. We expect that the bulk of the<br />

transit traffic will be carried by a small number of networks/ASs<br />

that are designated as fully transit. For ease of discussion, we<br />

call them "backbones". Other systems will carry a limited amount<br />

of transit traffic, dictated by policy agreements. Many others<br />

will act as stub systems carrying no transit traffic.<br />

We are designing for a reasonably simple topology with back-doors<br />

and short-cuts. We expect to be connecting heterogenous systems,<br />

where heterogenaity include gateways, protocols, and network<br />

technologies.<br />

The conceptual elements of the protocol are Routing Agents,<br />

Policy Agents, Forwarding Agents, User Agents, and Data<br />

Collection Agents. The Routing agents compute routes based on<br />

topology, policy, and type of service. They negotiate with the<br />

User Agent about whether a service can be provided or not. Tihe<br />

Policy Agent maintains the policy database, including the<br />

validation and sanity checking functions° The Forwarding Agent<br />

is what we currently think of as an IP-router. It accepts<br />

packets for forwarding. The User Agent may reside in the host<br />

or the host’s gateway and negotiates a route based on the<br />

application/user,s policy credentials. The Data Collection Agent<br />

supports the dynamic features of the protocol.<br />

The key features of the protocol are data reduction by<br />

recursively dividing the <strong>Internet</strong> into "areas", source routing,<br />

route set-up, and link attribute lists. The routing element is<br />

the way-station, which is the entrance point to Autonomous<br />

Regions. More information about the architecture itself can be<br />

found in the slides.<br />

-204-


-20 5-


.-207.-


-208-


.<br />

-209--


-210-


-211-


NASA Science I~nt~.=~r.net<br />

Milo S. Medin<br />

Sterling Software Corporation<br />

NASA Science lnternet Project Office<br />

NASA Ames Research Cen~er<br />

medin@nsipo.nasa, go v<br />

-212 -


2::<br />

0<br />

1<br />

1<br />

-214-


CD<br />

0<br />

0<br />

0<br />

c~<br />

r~<br />

0<br />

Z<br />

0<br />

0<br />

0<br />

c-<br />

O<br />

O_<br />

0<br />

0<br />

0<br />

0<br />

0<br />

-215--


E:<br />

~D<br />

Z<br />

< rj’)<br />

0<br />

0<br />

0<br />

0<br />

~D<br />

0<br />

<<br />

><br />

Z<br />

-216-


0<br />

0<br />

c-<br />

O<br />

0<br />

0<br />

0<br />

0<br />

-217 -


-218-<br />

|"


4--<br />

0 00<br />

0<br />

I<br />

-219-


÷<br />

I<br />

c-<br />

0<br />

O~<br />

c-<br />

(D<br />

c-<br />

O<br />

0<br />

-220-


Z<br />

O_<br />

09<br />

0<br />

0<br />

0<br />

X<br />

-221-


Ez©<br />

lllll<br />

0<br />

-222-


0<br />

c~<br />

c~<br />

0 n-<br />

Z<br />

cO<br />

Z<br />

0<br />

0<br />

0<br />

0<br />

(D<br />

Z<br />

Z<br />

0<br />

0<br />

0<br />

0<br />

0<br />

.~-<br />

O_<br />

c-’<br />

0<br />

(D<br />

0<br />

0<br />

c-<br />

c-<br />

O<br />

0<br />

0<br />

.0<br />

0<br />

0<br />

Z<br />

-223-


~ U<br />

-224-


0<br />

©<br />

O<br />

Z<br />

CO<br />

Z<br />

Z<br />

0<br />

0<br />

0<br />

Z<br />

--225-


0<br />

0<br />

0<br />

0<br />

Z<br />

0<br />

~D c-<br />

O<br />

0<br />

0<br />

O_<br />

0<br />

0<br />

0<br />

0<br />

n<br />

Z<br />

0<br />

0<br />

~D<br />

I<br />

Z<br />

-226-


0<br />

0<br />

O<br />

E<br />

0<br />

0<br />

-,227-


0I<br />

0<br />

c-<br />

II<br />

0<br />

0<br />

0<br />

I<br />

Z<br />

CO<br />

Z<br />

0<br />

Z<br />

-228-


NSN circuit utilization<br />

I | I1<br />

ill I<br />

, . ¯ ,.i ....... ,,~.~ ....... =, .................<br />

l 11 lllll<br />

I ! II ! ~ .......... ........<br />

Mar31<br />

Apt 05 Atx" 06 Apt 07 Apt 08<br />

Day<br />

jpiouhi<br />

Mar 31 Apt 01 Apr.02 Alx 03 A~ 04 A~ 0~ Apt 06 Apr 07 Apr 08<br />

Mar31 Alx 01 Apt 02<br />

Apt 6¢<br />

¯ Apt 05<br />

. AI~ 06 AI~ 07 Apt 08<br />

-229-<br />

¯<br />

¯ Day<br />

..<br />

¯<br />

..<br />

,,


Z<br />

C~<br />

Z<br />

Z<br />

0<br />

(--<br />

0<br />

0<br />

O<br />

0<br />

0<br />

¯<br />

¯<br />

0<br />

(D.<br />

0<br />

0<br />

-230-


State of the <strong>Internet</strong><br />

Presented by Zbigniew Opalka<br />

The number of networks in the <strong>Internet</strong> continues to grow. Since<br />

the beginning of the year the number of networks~ as reported by<br />

the Butterfly Mailbridges, has risen from approximately 550 to<br />

750 by April i. If this trend continues, as is expected, the<br />

<strong>Internet</strong> will reach 1,000 networks by the third quarter of this<br />

year.<br />

The Arpanet is steadily going away. Sites previously on the<br />

Arpanet are moving to various regional networks across the<br />

country. These regional nets are connected by the NSFNet; though<br />

connectivity to the Milnet is still provided by the Mailbridges.<br />

A new experimental terrestrial Wideband network is planned to<br />

provide connectivity between some sites currently attached to the<br />

Arpanet. The old satellite Wideband is being replaced by a<br />

network connected by T1 trunks, using a modified IEEE 802.6-type<br />

technology. The services provided by this network include<br />

datagram service (unannounced traffic), stream messages<br />

(resources reserved across the network), as well as<br />

multi-casting scheme using dynamic group addressing.<br />

The terrestrial Wideband network is composed of Butterfly<br />

Wideband Packet Switches (WPS) connected by T1 trunks. Attached<br />

to the WPSs are Butterfly <strong>Internet</strong> Gateways and Stream<br />

(ST-protocol based) Gateways.<br />

Mailbridges<br />

All six of the Butterfly Mailbridges are operational. They are<br />

currently supporting 210 neighbors (combined on both the Arpanet<br />

and Milnet). The LSI-II Mailbridges were decommissioned on March<br />

6, though the LSI-II EGP servers are still functional. It is<br />

highly recommended that anyone still using the LSI-II EGP se~-vers<br />

move over to the Butterflies as soon as possible.<br />

The Mailbridges are passing around 8 million packets per day.<br />

This figure varies greatly, anywhere between 6 and 13 million<br />

packets are sent per day. The drop rate across the Mailbridges<br />

for queuing reasons (not counting ttl expiration and<br />

unreachability) is insignificant (a total of 675 packets<br />

.00856 %). Average length of the packets passing through the<br />

Mailbridges is around 150 bytes.<br />

As stated earlier, the Mailbridges provide the connectivity<br />

between the Arpanet and Milnet. To enhance Milnet connectivity<br />

with the rest of the <strong>Internet</strong>, Ethernet interfaces will be added<br />

to the Butterfly Mailbridges first at Ames (west coast) and Mitre<br />

(east coast), then to the other Mailbridges. The Ethernets,<br />

Ames and Mitre, will also have attached to them an NSS, an NSFNet<br />

backbone switch.<br />

-232-


Page 2<br />

State of the <strong>Internet</strong><br />

Two bugs have been discovered in the Mailbridges. The first<br />

deals with decrementing the TTL field in the IP header and then<br />

dropping the packet is the TTL drops to 0. The Mailbridges were<br />

decrementing the TTL as required. They would drop a packet if<br />

its TTL was 0 when it first entered the Mailbridge. The problem<br />

occurs when a Mailbridge decrements a TTL whose value was 1 when<br />

it entered the Mailbridge, the Mailbridge would check for 0;<br />

decrement the 1 (to 0) and forward the packet. The fix will<br />

be deployed in the next major release of the Mailbridge code,<br />

The second problem dealt with the EGP~ finite state machine (fsm)<br />

implementation. EGP, after neighbor acquisition, expects either<br />

Polls or Hellos to bring the EGP "link" up. The Mailbridges were<br />

expecting only Hellos after the initial neighbor acquisition,<br />

thereafter they would accept either Hellos or Polls. The code<br />

was fixed to accept both types of messages after neighbor<br />

acquisition and the fix has been deployed.<br />

--233-


-234-


-235-


-236-


-237-


Z<br />

-238-


-239-


-240-


-241-<br />

¯ ¯ ® ¯


©<br />

-242-


-243-


Growth of the <strong>Internet</strong><br />

Presented by Mike St. Johns<br />

Based on the accumulated 5 years of data from BBNCC regarding<br />

advertised networks, the growth of the internet appears to be<br />

exponential. Previous graphs of the growth of network numbers<br />

have been plotted on linear axises, and we’ve long suspected the<br />

growth was exponential. I regraphed the data on a semi-log graph<br />

(linear X is time, log Y is number of networks) and then did<br />

fit on the data. The data line and the fit line appear to be<br />

pretty close. Unfortunately, I did not have access to tools<br />

which would have allowed a more formal statistical analysis of<br />

the data.<br />

The doubling period of the data is approximately 13-14 months.<br />

We should reach I000 networks by November of 1989, 8000 by March<br />

of 1993. If the trend continues, we could reach a million<br />

networks by sometime in 2000.<br />

Based on the 5 year trend, I actually believe we could have as<br />

many as 8000 networks by 1993. I think its too early to believe<br />

the year 2000 prediction, but it is settinq off some warning<br />

bells.<br />

-244-


0<br />

0<br />

0<br />

0 0 0 0<br />

0 (D 0 0<br />

(D<br />

(D<br />

0<br />

(3<br />

-245-


©<br />

©<br />

0<br />

-246-


-248-


DOE Energy Science Network<br />

Presented by Tony Hain<br />

ESnet is a service for DOE sponsored researchers providing<br />

enhanced communications facilities. Primary service is provided<br />

for the 5 Energy Research programs supported by the Office of<br />

Energy Research. Its goals are:<br />

Enhance Inter-program communications<br />

Enhance International collaborations<br />

Reduce costs<br />

Increase interconnectivity with other agency networks<br />

Increase performance<br />

Support OSI standards<br />

Current projects include:<br />

ITER program support for the US team<br />

MFEnet II upgrade<br />

Backbone Upgrades to T1<br />

X.25 backbone services for international access<br />

International and Interagency gateways<br />

At the January IETF I reported that we were in the midst of an<br />

audit by the DOE/IG. The IG report has been filed recommending<br />

that we leave both HEPnet and MFEnet as they are, "all of the<br />

users are happy with the services they have"° A formal rebuttal<br />

has been filed pointing out that current requirements cannot be<br />

met with existing services.<br />

ESnet underwent a program review March 6,7 by an outside panel of<br />

network specialists. The final report has not been submitted, but<br />

preliminary recommendations included:<br />

Centralize management of the DECnet with the lip backbone<br />

Drop IP encapsulation (required to switch X25 and IP on the same<br />

lines) plans<br />

Drop T1 multiplexing plans<br />

ESnet has undergone several significant changes since the January<br />

meeting. A decision was made to .drop X.25 as a native backbone<br />

service and allow DECnet phase IV in its place. This allowed<br />

procurement rather than development of the backbone routers.<br />

There are currently 19 sites identified for T1 service in<br />

calender ’89. Dual protocol routers are being procured for the T1<br />

backbone. ’<br />

NASA and NSF backbone interconnects with ESnet are being planned.<br />

Implementation discussions will be held in the near future at<br />

MERIT.<br />

-250-


ilin<br />

-252-


In<br />

If<br />

in<br />

-253-


-254-


-<br />

[:: ¢::<br />

cos 0<br />

LU<br />

-255-


¢~.<br />

0<br />

~0<br />

-256-


~D<br />

0<br />

C<br />

0<br />

E<br />

0<br />

c-<br />

~~D<br />

O<br />

E<br />

E<br />

00~D<br />

-257-<br />

~.u ~<br />

C<br />

0O_<br />

~D


C<br />

E ¢ E<br />

E<br />

-0<br />

0<br />

rO<br />

-2.58-


m~mmm|<br />

"0<br />

0<br />

(D<br />

0<br />

X<br />

mmmm<br />

0<br />

c-<br />

.<<br />

X<br />

E<br />

~m~<br />

0<br />

0g 0<br />

c-- ~<br />

0 CL<br />

0 (D<br />

CD (’} C~<br />

U) C~)<br />

¯<br />

0 (D<br />

0 *<br />

0 (D<br />

0 c"<br />

0<br />

0<br />

(D :3<br />

> 0<br />

-259-


-260-


An Interim<br />

Presented<br />

Routing Architecture<br />

by Russ Mundy<br />

The purpose of the Interconnectivity Working Group (IWG)<br />

to develop an interim Inter-Autonomous-System routing<br />

approach which will be available prior to the results of the<br />

work of Open Routing Working Group (ORWG). This<br />

necessary since the current Exterior Gateway Protocol (EGP)<br />

is inadequate and implementation of new ORWG solution will<br />

not be available for some time.<br />

TIME<br />

-><br />

EGP<br />

Sufficient<br />

Open<br />

Routing<br />

Available<br />

--><br />

Time-Frame for<br />

IWG Efforts<br />

There have been several previous meetings of the IWG and<br />

significant mailing list activity by the working group.<br />

Prior to the Austin IETF meeting, the IWG participants had<br />

primarily been individuals involved with managing National<br />

and/or Regional networks. During the Austin IETF, vendor<br />

representatives were asked to provide their views on the IWG<br />

approach. During the open meeting, the vendor<br />

representatives made general comments but were not negative<br />

about the IWG approach. Subsequent to the meeting, each of<br />

the vendor representatives contacted the IWG chairman and<br />

expressed concern about the commercial viability of making<br />

frequent protocol changes in their products which was being<br />

inferred by the timing of the IWG and the ORWG efforts.<br />

Generally, their constraints include interoperability of the<br />

new protocol with the installed operational base and their<br />

cycle for major software releases (usually only one per year<br />

for major protocol changes).<br />

As a result of the vendor inputs and the previous work of<br />

the IWG, the chairman drafted a Midterm Inter-Autonomous<br />

Routing Architecture (MIRA) that was distributed to the IWG<br />

mailing list prior to the Cocoa Beach IETF meeting. This<br />

draft paper became the basis for much of the discussion at<br />

this IETF meeting.<br />

The ORWG participated in the first portion of the IWG<br />

meeting. This joint meeting provided ORWG participants the<br />

-262-


Page 2<br />

An ~nterim Routing<br />

Architecture<br />

opportunity to review and comment on the IWG efforts. The<br />

general impression is that MIRA is a different solution to<br />

many of the problems being addressed by the ORWG but there<br />

are some areas where the MIRA approach could provide useful<br />

lessons for the ORWG.<br />

The approach described in the MIIRA paper provides improved<br />

prevention of loops, better fault detection and better<br />

support for the extensive connectivity between Networks and<br />

Autonomous-Systems. MIRA also seeks to minimize<br />

implementation difficulties for both vendors and network<br />

providers/operators.<br />

MIRA achieves many of these features by separation of<br />

functions. For example, route maintenance and packet<br />

forwarding is currently bundled in a single gateway. MIRA<br />

separates these functions into route server and border<br />

gateway. The separation also makes it feasible to provide a<br />

full Autonomous-System path that can be used to determine<br />

routes for packets. The route servers communicate with<br />

border gateways within its Autonomous-Systems as well as<br />

with route servers in other Autonomous-Systems.<br />

There are several current problems/difficulties that MIRA<br />

has not yet solved. Some of these include: the method for<br />

the initial bootstrap of a system is not clear; a method of<br />

providing reliable communications between route servers<br />

needs to be defined; the method of achieving consistency<br />

between the route servers within an Autonomous-System is not<br />

defined; and the method(s) route servers use to choose<br />

between routes is not defined.<br />

In addition, some of the ideas presented by the MIRA are<br />

being implemented by several participants of the IWG to gain<br />

experimental experience. Preliminary information from these<br />

implementations should be available for the July IETF<br />

meeting.<br />

-263-


-264-


%


Architectural Changes to the NSFNET<br />

Presented by Elise Gerich<br />

In the nine months that Merit has managed and operated the NSFNET<br />

backbone, traffic on the network has grown substanitially as<br />

havethe number of networks announced by the backbone. In the<br />

lastmonth, March 1989, we saw an approximately 30% increase in<br />

thetraffic on the backbone, and have over 450 nets connected via<br />

mid-level networks.<br />

Recognizing that the traffic was probably not going to decrease,<br />

and wanting to continue to offer good service to our users, MCI,<br />

IBM and Merit began to meet to plan an expansion of bandwidth for<br />

the backbone. As guidelines to our planning sessions, we<br />

established five primary objectives in redesigning the backbone.<br />

These objectives<br />

i)<br />

2)<br />

s)<br />

were:<br />

Eliminate the single tail circuits<br />

Provide a network diameter of 3 or less<br />

Provide a full T1 rate end-to-end bandwidth<br />

Be financially feasible<br />

Take initial steps toward DRS (Digital Reconfiguration<br />

Services)<br />

The first objective, eliminating the tail circuits, was identified<br />

as the most pressing need to address~ but we agreed it was<br />

desirable to fullfill all of the objectives° With these goals in<br />

mind, we came up with a new physical topology for the NSFNET<br />

backbone.<br />

Instead of 14 circuits connecting the 13 nodes, six of which were<br />

single tail circuits, the new topology consists of 19 circuits<br />

with three circuits terminating at each node except for MIDnet<br />

which has two circuits coming into it. This redesigned topology<br />

meets all of our objectives.<br />

The single tail circuits<br />

are eliminated.<br />

The network diameter is 3.<br />

Each node has circuits of full T1 rate bandwidth instead of<br />

the sub-Tl rate logical links that are currently provided on<br />

thebackbone.<br />

The redesign<br />

fits within our budget°<br />

And finally, this topology moves us toward DRS (Digital<br />

Reconfiguration Services). As you can see from the accompanying<br />

slide, we are moving toward an architecture where the circuits<br />

from each node feed into an MCI cloud. Within that cloud,<br />

-266-


Page 2<br />

Architechtural Changes to the NSFNET<br />

circuits may be allocated dynamically. We see this redesign as<br />

the first step toward implementing DRS.<br />

Along with this redesign of the topology, MCI has been upgrading<br />

some of its digital radio circuits with fiber. As we put the new<br />

physical network in place~ almost all of the circuits will be<br />

fiber, except for those circuits in the northwest and a few local<br />

loops.<br />

The implementation phases of the new design are already under<br />

way. The circuits are ordered, additional hardware/software is<br />

being installed on the NSSs, and preparation by the sites is in<br />

process. There are four primary phases in the migration to the<br />

new topology.<br />

Phase A which installs four additional circuits to the current 14<br />

circuit topology is tentatively scheduled to be in place by the<br />

beginning of June ’89. This phase addresses the need to<br />

eliminate the single tail circuits.<br />

The following three phases, B thru D, consist of installing<br />

and disconnecting pairs of circuits. One of our objectives in<br />

order to stay within budget is to eliminate the need for<br />

redundant circuit terminations at the local site. For instance,<br />

SDSC currently has four circuits terminating at its site, but<br />

only two of those circuits will. exist in the future backbone. So<br />

instead of installing an additional circuit at the local telco,<br />

we plan to roll one circuit out and another in. So at no time<br />

during the migration will any node exceed the final three local<br />

connections needed nor the existing number of connections.<br />

Furthermore, no nodes should become isolated during the<br />

installation.<br />

Phases B thru D are expected to be in place in July ’89. With<br />

the completion of those phases, we will have attained our<br />

objectives.<br />

In addition to redesigning the backbone technology, Merit has<br />

been addressing the need for direct peer network connections.<br />

Toward this end, we have met with Milo Medin, of NASA, and Mike<br />

St. Johns,of DCA, to design direct connections between the NSFNET<br />

backbone and NSN and Milnet.<br />

In the case of Milnet, we are in the process of deploying a<br />

configuration which we call a Split E-PSP (exterior packet<br />

switching processor). In this configuration,an NSS will have<br />

RT colocated on an Ethernet with a Butterfly-Mailbridge. This<br />

Split E-PSP will establish an EGP session with the Mailbridge.<br />

Then, the Split E-PSP has a serial connection to the rest of the<br />

NSS, and this provides a direct connection between the backbone<br />

and the DDN.<br />

-267-


Page 3<br />

Architectural Changes in NSFNET<br />

The Split E-PSP configuration will be deployed from both NSS 13<br />

(BARRNet) and NSS 9 (SURAnet), giving the NSFNET two connections<br />

to the DDN; one on the west coast and one on the east coast. We<br />

anticipate that at least one ofthe Mailbridges will be connected<br />

to the backbone by the end of May ’89. This date hinges on the<br />

availablity of T1 circuits.<br />

This Split E-PSP configuration at NSS 13 will also provide a<br />

direct connection to the NSN (NASA Science Net). Not only will<br />

the NSS EGP peer with the mailbridge, but also with a NSN-router.<br />

Milo Medin has also been negotiating with Jack Hahn at SURAnet to<br />

establish a SURAnet/NSN connection at NSS 9. If all goes well,<br />

NSFNET should have an east and west direct connection to both NSN<br />

and the Milnet.<br />

The NSFNET backbone announces approximately 60 international<br />

networks. Most of these announcements are received via a<br />

standard NSS configuration, but we have implemented an EGP<br />

session via a serial link with CNUSC in Montpellier, France.<br />

This configuration is described on one of the accompanying<br />

slides. Currently the lihk between NSS 10(CNSF/NYSERnet) and<br />

CNUSC is a 56 Kbps Satellite link, but we are planning to upgrade<br />

this to T1 via TAT8.<br />

Merit is pleased to announce the above architectural changes to<br />

the NSFNET backbone. However, this is just a beginning. We have<br />

recently deployed and made available SNMP. We continue to<br />

explore further changes and enhancements to NSFNET, such as ISO<br />

CLNP support, T3 upgrade, and possibly Xo25 support. These are<br />

just a few of the next steps for NSFNET.<br />

-268-


Physical NSFNET Topology<br />

Clrcles contain NSS numbor<br />

-269-<br />

Pf~p~,ed by NSFNET..lnfo@medt.e


Million Packets per Month<br />

NSFNET Trafl]c<br />

into/out-of the backbone<br />

70O<br />

¯<br />

¯ o<br />

¯<br />

¯ : °<br />

..: ..... ~ ..... ¯ ..... ." .....<br />

..~ ..... .~ ..... :. ..... .. .....<br />

¯<br />

¯ ". ¯ : :<br />

50O<br />

.. .. .<br />

..<br />

:<br />

..<br />

."<br />

¯<br />

:<br />

:<br />

: :<br />

3OO<br />

¯<br />

: ." -<br />

~ : -<br />

:<br />

." .<br />

:<br />

¯ .: ..... ; ....<br />

." .<br />

¯<br />

200<br />

100<br />

8/87 9/87 10/87 11187 12187 1188 2/88 3188<br />

4/88’-~/88 6/88 7/88 8/88 9188 10/88 11/88 12/88 01/89 02/89<br />

-270-


Net Number Count<br />

Network Number Counts<br />

Marcl~ 1989<br />

<strong>Internet</strong>-wide network number count<br />

600 ........................................................................................................................<br />

NSFNET directly attached via mid.level networks<br />

200 ..........................................................................................................................<br />

i<br />

¯<br />

¯<br />

¯ .<br />

......<br />

..<br />

...<br />

1 March 8 March 16 March 24 March<br />

Month of March<br />

-271-


Primary Objectives<br />

Eliminate the tail circuits (Redundancy)<br />

Maintain network diameter of 3 or less<br />

Provide each node with bandwidth of full T1<br />

Be financially<br />

feasible<br />

Take initial<br />

steps toward DRS<br />

1/18/89 epg<br />

-272-


NSFNET DRS .Application<br />

slt~<br />

MCI DXC<br />

MCI DXC<br />

Tel~<br />

POP<br />

POP<br />

-273-°


Initial<br />

NSFNET deployment:<br />

New architecture:<br />

Logical<br />

Topology<br />

Physical<br />

Topology<br />

Logiezll<br />

Topology<br />

(physical)<br />

MCI Network<br />

Infrastructure<br />

(physical)<br />

MCI Network<br />

Infrastructure<br />

-274-


Utilization in Percent<br />

NSFNET Logical Link Utilizalion<br />

]Peak: vs. Average<br />

19<br />

18<br />

17<br />

15<br />

14<br />

13<br />

12<br />

11<br />

10<br />

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23<br />

NSFNET Logical Links<br />

-275-


i<br />

ii<br />

.i


NSFNET Logical Link Utilization<br />

Peak vs. Average<br />

Utilization in Percent "<br />

20 [ .... ,. ....". .....: .....: .....: ....: .... ’. ....’. ....: .....: .....: .....: .....: ....: .... ’. ....: .... : .....: .....: ....: .... ’. ....’. ....:<br />

141 .... l’"l’"l’": ..... :"....<br />

I I I !\<br />

13 ............ : .....<br />

i i .......................... "--i.... ::::::::::::::::::::::<br />

10 .... ~ .............................<br />

"...: .....i. ....i .....";....~.... : .... ~ .... ~ .....: .....:’....~.... : .... "...."."<br />

9 .... ~ .....................................<br />

: ! ! i i i ~ i ! ! i : : :<br />

./ ! i i : . . :<br />

~~ ......."..’..r’..~~<br />

.... .... .... :"..~-’~~.~:~~~~<br />

...........................................<br />

:: :: ~ ~ ~ ~ ~ ~ ~ ~ ! + .......... ~ ~ i :.............<br />

1~ .... i ....:.....’.....~ ....<br />

l ! i i i ! i ! i i i i ! i i : : : : ~. :" .,,.";’--’~ :.<br />

1 2 3 4 5 6 7 8 9 10, 11 12 13 14 15 16 17 18 19 20 21 22 23<br />

NSFNET Logical Links<br />

-277-


New NSFNET Backbone<br />

Circles contain NSS number (1-4 end 4$-46 ere test nodes)<br />

-279-<br />

Prepared by NSFNET-Info@medt.edu at Thu Apr 6 16:57:091989<br />

netm¢o.-1.5 program by Bri;an Reid, madata from Wodd Data Bank II<br />

Lambert ConformaJ Projection [44"N,33"N], Map center: [40"N, 96" 30"W]<br />

Image resolution 300/in., stroke limit 1 ~ixels


Utilization in Percent<br />

20<br />

NSFNET Logical Link Utilization<br />

Peak vs. Average<br />

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23<br />

NSFNET Logical Links<br />

-280-


.0<br />

¯<br />

-281-


-282-


--283- .


-284-


NEW TOPOLOGY<br />

" Fatter " pipes for packet switching<br />

No multiplexing and demultiplexing at sub T1 rates<br />

Clear channel T1<br />

Greater redundancy<br />

. No single tail circuit sites<br />

. No articulation points<br />

Optimized for MCI infrastructure<br />

. MCI redundancy<br />

. Optimum MCI routes<br />

Greater degree of connectivity<br />

3.07 v/s 2.15<br />

-285-


Planned<br />

NSFNET/NSN/DDN connection<br />

at NASA Ames<br />

NSS # 13<br />

L/<br />

Possible EGP sessions:<br />

. NSS - Mailbridge<br />

. NSS - NSN Router<br />

. NSN Router- Mailbridge<br />

BARRNET connection<br />

TI llnk<br />

(Stanford - Ames)<br />

DSUICSU<br />

Split E-PSP<br />

Butterfly-<br />

Mailbridge<br />

I<br />

7 March 1989, HWB<br />

-286-


Planned NSFNET/NSN/DDN connecti~m at<br />

the University of Maryland<br />

Possible EGP sessions:<br />

NSS #9<br />

. NSS -Mailbridge<br />

. NSS - NSN Router<br />

I<br />

II<br />

connection<br />

"N~ "N~College Park - McLean)<br />

i<br />

[ NSN.Router<br />

L.~ ~" DSUICSU<br />

Split E.PSP<br />

NASA<br />

Science Net<br />

Mitre<br />

Butterfly-<br />

Mailbridge<br />

Arpanet<br />

7 March 1989, HWB<br />

-287-


Recently deployed:<br />

¯ SNMP<br />

Planned:<br />

¯ ISO CLNP support<br />

Proposed:<br />

. T3 upgrade in 1990<br />

Being considered:<br />

. X.25 support<br />

¯ ,<br />

10 April ~989, H~VB<br />

-288-


Nifty NSFNET Stats, using NNStat<br />

Presented by Elise Gerich<br />

Reported by Dave Katz<br />

When the National Science Foundation sent out the solicitation<br />

~for the NSFNET in 1987, one of the charges was to provide<br />

continuous information gathering relative to the activity on the<br />

network and distribute the resulting data in electronic and<br />

hardcopy form.<br />

This is being accomplished with the use of NNStat (NSF Net<br />

STATistics), a package written with NSF funding by Bob Braden and<br />

Annette DeSchon at the Information Sciences Institute at USC.<br />

This package was originally coded .to run in a Sun workstation<br />

attached to an Ethernet; changes were made to it and to the BSD<br />

4.3 kernel so that it would run on an IBM IRT PC attached to a<br />

token ring network.<br />

The NNStat set of programs and utilities provide a flexible<br />

method for gathering traffic statistics, querying them<br />

interactively, and remotely collecting them for later analysis.<br />

There are three major components<br />

to the package:<br />

Monitoring--"Statspy,, listens to the traffic on a network<br />

and builds statistical objects based on what it hears<br />

Query--"Rspy’, allows remote interactive queries to Statspy,<br />

providing the capability of dynamically altering its<br />

configuration and displaying gathered data<br />

Collection--"Collect,, remotely retriew~s statistics from<br />

Statspy and logs it to disk for later processing<br />

Installation<br />

A cooperative effort was undertaken to install NNStat in the<br />

backbone. First of all, the NNStat application itself was ported<br />

to the IBM RT by Merit <strong>Internet</strong> <strong>Engineering</strong> staff. This entailed<br />

minor modifications to run in the RT environment, as well as the<br />

addition of a few features, the most notable of which is a<br />

security enhancement that restricts access to statistics data to<br />

a small number of machines.<br />

The Berkeley 4.3 "Packet Filter" was installed in the NSS kernel<br />

by Merit IE staff to provide an application interface to the raw<br />

packet stream. This package was optimized and enhanced to meet<br />

the needs of NNStat.<br />

The IBM Token Ring adaptor driver software was modified by Merit<br />

IE staff to support the Packet Filter interface and the<br />

"promiscuous" reception of packets.<br />

-290- --


Page 2<br />

Nifty NSFNET Stats, using NNStato<br />

A set of Read Only Memory (ROM) chips were obtained through the<br />

courtesy of Texas Instruments that allow the Token Ring adaptor<br />

to receive all token ring traffic. These chips were duplicated<br />

en masse by members of the Network Operations Center staff, and<br />

were installed by IBM’s se~ice representatives at each of the<br />

backbone sites.<br />

Staff in the Merit Information Services group continue to work on<br />

a database into which the raw statistics information is placed.<br />

This database will provide a flexible way of retrieving subsets<br />

of sample data as well as aggregations of data. It will be<br />

possible to convert the data to graphical representations as<br />

well.<br />

Configuration<br />

A dedicated IBM RT in each NSS is used to run Statspy. The RT<br />

receives all data on the NSS token ring, which has a number of<br />

desirable characteristics:<br />

all user data traverses the token ring<br />

both transit traffic and traffic to/from the local NSS are<br />

present<br />

intra-backbone traffic (such as routing protocol traffic)<br />

present<br />

no local site (intra-regional) traffic is visible<br />

An IBM RT at the NSFNET NOC in Ann Arbor, running Collect,<br />

periodically calls out to each of the backbone statistics<br />

gatherers, logs the values of their statistical objects to disk,<br />

and clears the objects. The logs are transferred to the NSFNET IS<br />

mainframe. Once Berkeley Socket support is available on the IS<br />

mainframe, the Collect application will be ported to run there,<br />

thus eliminating staging the data on an RTo<br />

On the mainframe, the raw statistics data is processed and loaded<br />

into a SPIRES database. Ancillary data, such as the mappings<br />

between network numbers and Autonomous System numbers, are added<br />

to the database as well. The database will allow flexible data<br />

retrieval by location, time, and other parameters. The raw data<br />

are archived to tape.<br />

The gathering of statistics data has a negligible impact on<br />

network performance. The CPU-intensive parts of the process are<br />

performed on dedicated machines that are not involved in the<br />

switching of packets, and the data collected from the backbone is<br />

~odest in volume compared to the traffic levels.<br />

Data Collected<br />

Approximately i0 million bytes of raw statistics data are<br />

collected daily. The bulk of the data are source/destination<br />

-291-


Page 3<br />

Nifty NSFNET Stats, using NNStat<br />

network number pairs. Other data collected include the token<br />

ring packet switching rate, the distribution of well-known TCP<br />

and UDP ports, and the distribution of packet sizes. Data is<br />

collected with a granularity of fifteen minutes.<br />

The accompanying slides contain the followinq:<br />

A sample configuration for Statspy. This configuration<br />

defines the statistical objects to be built, as well as the<br />

access restrictions in effect.<br />

Sample output from Rspy. This output corresponds to the<br />

configuration shown previously. The verbose logs from<br />

Collect are nearly identical. Terse logs from Collect<br />

contain th~ same information but in considerably less disk<br />

space.<br />

Sample graphs. These graphs were put together quickly using<br />

relatively small amounts of data for illustrative purposes,<br />

although the data is real.<br />

-292-


-293-


-294-


-295-


-296-


oO<br />

Z<br />

o9<br />

Z<br />

E<br />

- 0<br />

(’6AV) puo0~9 .~ed s~e~tOgd


CO<br />

Z<br />

Z<br />

II<br />

0<br />

HI<br />

II<br />

COO<br />

!<br />

!<br />

II<br />

on<br />

II<br />

I<br />

IO<br />

i II<br />

0<br />

,4ouenbe.~.-I


¯<br />

II<br />

,4ouenbeJ-.I


Z<br />

0<br />

¯ ~z _o<br />

!--<br />

,4ouenbe.~


Inter Autonomous System Routing Alternatives<br />

Presented by Yakov Rekhter/IBM<br />

Since Inter-Domain Routing is not going to be available in<br />

the near future, and since using EGP as an inter-Autonomous<br />

system protocol becomes more and more unfeasible, work<br />

should be done on the EGP replacement. This is largely due<br />

to an increase in complexity for connectivity between<br />

Administrative Domains.<br />

The IETF IWG group is concentrating on providing this<br />

intermediate solution for EGP replacement. Most of the<br />

members of IWG are deeply involved with NSFNET as well.<br />

Initially the basis for the next Inter-AD routing<br />

architecture seemed to be satisfyable by means of the EGP3<br />

protocol. However, during the discussions in the working<br />

group it became obvious that the EGP3, as proposed, would<br />

only satisfy reachability, but not routing requirements.<br />

Using some ideas from the IWG, IBM and CISCO came up with a<br />

draft proposal for the EGP replacement - The Border Gateway<br />

Protocol (BGP). BGP does not impose any requirements on the<br />

IGP within an Administraive Domain or Routing Domain.<br />

IBM and CISCO already have an initial implementation of this<br />

protocol. Testing is done between NSS-I (at Merit) and CISCO<br />

router (either at Merit or at CISCO). This is done by Jacob<br />

Rekhter (IBM, implementing the NSS code), Kirk Lougheed<br />

(Cisco, implementing the Cisco version) and Jessica<br />

(Merit, testing and verifying interoperability).<br />

Jeff Honig at the Cornell University Theory Center is<br />

working on a public domain BGP implementation (as part of<br />

GATED)<br />

A draft paper on BGP is available.<br />

hwb@merit.edu.<br />

Send mail to<br />

We have to make very rapid progress with BGP. It is<br />

currently in an experimental stage, but should be moved to<br />

an operational stage once the architecture proves feasible°<br />

-302-<br />

..


--303-


-304-<br />

~ .


-305-


Requiem for the Arpanet<br />

Vinton G. Cerf<br />

-308-


Requiem<br />

for the ARPANET<br />

Vint Cerf<br />

Like distant islands sundered by the sea,<br />

We had no sense of one community.<br />

We lived and worked apart and rarely knew<br />

that others searched with us for knowledge, too.<br />

Distant ARPA spurred us in ourquest<br />

and for our part we worked and put to test<br />

new thoughts and theories of computing art;<br />

we deemed it science not, but made a start.<br />

Each time a new machine was built and sold,<br />

we’d add it to our list of needs and told<br />

our source of funds "Alas! Our knowledge loom<br />

will halt ’til it’s in our computer room."<br />

Even ARPA with its vast resources<br />

could not buy us all new teams of horses<br />

every year with which to run the race.<br />

Not even ARPA could keep up that pace!<br />

But, could these new resourcesonot be shared?<br />

Let links be built; machines and men be paired!<br />

Let distance be no barrier! They set<br />

that goal: design and build the ARPANET!<br />

As so it was in nineteen sixty-nine,<br />

a net arose of BBN design.<br />

No circuit switches these, nor net complete<br />

but something new: a packet switching fleet.<br />

The first node occupied UCLA<br />

where protocols and measurement would play<br />

a major role in shaping how the net<br />

would rise to meet the challenges unmet.<br />

The second node, the NIC, was soon installed.<br />

The Network Info Center, it was called.<br />

Hosts and users, services were touted:<br />

to the NIC was network knowledge routed.<br />

Nodes three and four soon joined the other two:<br />

UCSB and UTAH come on cue.<br />

To monitor it all around the clock<br />

at BBN, they built and ran the NOC.<br />

A protocol was built for host-to-host<br />

communication° Running coast-to-coast,<br />

below the TELNET and the FTP,<br />

we called this protocolthe NCP.<br />

The big surprise for most of us, although<br />

some said they guessed, was another protocol<br />

used more than all the rest to shuttle<br />

mail in content flaming or most subtle.<br />

-310-


When we convened the first I Triple C,<br />

the ARPANET was shown for all to see.<br />

A watershed in packet switching art,<br />

this demo played an overwhelming part.<br />

Within three years the net had grown so large<br />

we had to ask that DCA take charge<br />

to operate a system guaranteed<br />

for R&D and military need°<br />

Exploring other packet switching modes,<br />

we built the first spread spectrum mobile nodes°<br />

The Packet Radio, the mobile net,<br />

worked on the ground and even in a jet.<br />

Deployed at SAC and Eighteenth Airborne Corps,<br />

the Packet Radio unlocked the door<br />

to what we now know as the <strong>Internet</strong>.<br />

The driver for it all was PRNET.<br />

The Packet Satellite, another new<br />

technique, was added to the net milieu.<br />

And then to shed more light upon the dark,<br />

there came the Etherne~ from Xerox PARCo<br />

To these we added yet another thing<br />

from MIT: a local token ring.<br />

We saw the local net techniques compound<br />

until the list could easily confound.<br />

The <strong>Internet</strong> foundation thus was laido<br />

Its protocols from many sources made.<br />

And through it all the ARPANET grew more;<br />

It was, for <strong>Internet</strong>, the central core°<br />

The hardware of the net was changing, too.<br />

The Honeywell was first, and then the SUE,<br />

which forms the heart of Pluribus today<br />

though where this platform sits one cannot say.<br />

The next big change was called the MBB.<br />

It emulated Honeywell, you see,<br />

so one by one they modified each node,<br />

by means of closely written microcode.<br />

Now known as 30 prefixed with a C,<br />

these nodes are everywhere from A to Zo<br />

The European MINET too was full<br />

of nodes like these from Mons to Instanbul.<br />

The second Autodin was long desired<br />

but once accepted instantly expired.<br />

Then to the rescue rode the ARPANET!<br />

And soon the MILNET by its side was set.<br />

-311-


By Nineteen-Eighty DoD opined<br />

its data networks soon must be aligned<br />

with <strong>Internet</strong>work protocols, to wit:<br />

by Eighty-Three the TCP was IT!<br />

Soon every host that sat on ARPANET<br />

became a gateway to a local net.<br />

By Eighty-Six new long haul nets appeared<br />

as ARPANET its second decade neared°<br />

The NSFNET and its entourage<br />

began a stately national dressage<br />

and soon was galloping at T1 speed<br />

outdistancing its aging peer indeed.<br />

And so, at last, we knew its course had run,<br />

our faithful servant, ARPANET, was done.<br />

It was the first, and being first, was best,<br />

but now we lay it down to ever rest.<br />

Now pause with me a moment, shed some tears.<br />

For auld lang syne, for love, for years and years<br />

of faithful service, duty done, I weep.<br />

Lay down thy packet, now, O friend, and sleep°<br />

-312-


--313-


IU<br />

Z<br />

_<br />

:<br />

-314-


-315-


-316-


0<br />

F--<br />

uJ<br />

Z<br />

-317 -


Mailbridge Access Control<br />

Marianne<br />

Lepp<br />

-319-


-321-


-.322-<br />

¯ ¯ ¯


-323-


LU .,J<br />

0<br />

I,,.,,<br />

0<br />

r,-<br />

I-<br />

Z<br />

0<br />

0<br />

0


¯ ¯ ¯


The DCA TCP/IP Certification Program<br />

Presented by Martin Gross/DCA/DCEC<br />

In an effort to ensure compliance with its Military Standard Higih<br />

Level Data Communications Protocols (IP,TCP,FTP,SMTP,TELNET) and<br />

increase the probability of interoperability in its diverse<br />

multi-vendor environment, the Department of Defense (DoD) has<br />

initiated a program to certify vendor implementations of these<br />

products. As Executive Agent for the DoD Data Communications<br />

Protocols, the Defense Communications Agency (DCA) has been<br />

tasked with implementing this program.<br />

The policy for high level protocol conformance testing was<br />

established in a memorandum from the ~Assistant Secretary of<br />

Defense for Command, Control, communications and Intelligence<br />

dated 26 August 1988. The memorandum mandates conformance testing<br />

on all new contracts executed after 1 June 1989. Products<br />

procured under contract must be tested by a National Institute of<br />

Standards and Technology (NIST) accredited laboratory prior<br />

operational use on any DoD network. The memorandum also<br />

establishes a Qualified Products List which will be ~maintained by<br />

DCA. For a product to be placed on the Qualified Products List,<br />

acceptable tests results must be presented to DCA from an<br />

accredited laboratory which is independent of the vendor.<br />

DCA started an in-house testing program for DDN X.25 in 1983. Due<br />

to limited resources however, this program could not be continued<br />

in-house nor could a high level protocol test program be<br />

developed in the same manner. For this reason DCA turned to tlhe<br />

National Voluntary Laboratory Accreditation Program (NVLAP) run<br />

by NIST. Under NVLAP, laboratories are recognized and accredited<br />

to perform specific testing services aimed at evaluating products<br />

to determine if they meet applicable standards. As the program’s<br />

name specifies, this is a voluntary program and NVLAP<br />

accreditation does not imply the certification of products or<br />

test data. In July 1988, DCA requested that NIST establish a<br />

NVLAP for the DoD Protocols (DDN X.25 and the five High Leve3~<br />

Protocols). Formal establishment of the program was announced in<br />

the Federal Register on 21 July 1988. The X.25 Program was<br />

established first and there are currently three accredited<br />

laboratories. The NVLAP for the High Level Protocols is<br />

now being developed.<br />

The NVLAP Handbook for the High Level Protocols which presents<br />

the operational and technical requirements for an accredited<br />

laboratory was published in draft form on 22 March 1989. The<br />

document was mailed to all those who replied to the Federal<br />

Register Announcement and was open to public comment until the<br />

14 April. Laboratory applications are now being accepted by NIST<br />

and the first laboratory will be accredited by the middle of<br />

June. It is expected that there will be a minimum of three<br />

accredited laboratories.<br />

-327-


Page 2<br />

The DCA TCP/IP Certification<br />

Program<br />

The laboratories will be required to use the [)CA Upper Level<br />

Protocol Test System to perform the tes°ting service. The system<br />

was developed under DCA contract to provide a standard testing<br />

capability for the DoD High Level Protocols. The system tests<br />

protocol functionality including; upper layer interfaces,<br />

validity of outputs, and input error handling. (See Connexions<br />

Volume 2, Number 8 for further details) The test system operates<br />

on a VAX* cpu running Ultrix* 1.1 and is publicly available from<br />

the Nationa~ Technical Information Service. The system has been<br />

in use since December of 1987 and is currently in use by ten<br />

organizations for in-house testing.<br />

To clarify testing policies and provide guidance to vendors, DCA<br />

will publish a DoD High Level Protocols Testing Circular. The<br />

circular will establish specific testing policies relating to the<br />

testing of products across hardware lines and the retesting of<br />

modified products. The circular will also establish the procedure<br />

for placement of products on the Qualified Products List. The DoD<br />

Protocol Conformance Testing Profile will also be included in the<br />

circular. This Profile establishes the set of mandatory features<br />

that must be implemented in each protocol. It also indicates<br />

those features which are optional. This Profile has been approved<br />

by the DoD’s Protocol Standards Steering Group but is still<br />

available from DCA for public co~mment. The testing circular will<br />

be published in draft form by 1 June.<br />

To help vendors prepare their products for laboratory<br />

certification, DCA has installed a test system that can be used<br />

by vendors. This system will be available for the next nine<br />

months on a first come first served basis. The system is<br />

accesible through the <strong>Internet</strong> or a dial-up link and is available<br />

for self testing with no on-line support~ 3information is provided<br />

below on how to obtain further information on this program.<br />

Comments or questions relating to protocol testing can be<br />

addressed to:<br />

Martin Gross<br />

DCA Code R640<br />

1860 Wiehle Ave.<br />

Reston, VA 22090-5500 or<br />

by email: martin@edn-unix.dca.mil or martin@protolaba.dca.mil.<br />

For NVLAP information or documents contact: Jeff Horlick, NVLAP,<br />

NIST, Bldg 411, Gaithersburg, MD 20899, (301)975-4016.<br />

For the DCA Upper Level Protocol Test System and Documents<br />

contact:<br />

National Technical Information Service<br />

Springfield, VA 22161<br />

(703)487-4807. Product #AD-A204-558.<br />

*VAX and Ultrix are Trademarks of the Digital Equipment<br />

Corporation.<br />

-328-


W<br />

Z<br />

-329-


-330,-


d<br />

~ 0 0<br />

0<br />

0<br />

0<br />

0<br />

-331-


0<br />

0 ~D X<br />

-332-


0<br />

0<br />

0<br />

cco<br />


am<br />

0<br />

nnmlm<br />

"E<br />

0 0<br />

0<br />

0<br />

O<br />

-334-


¯<br />

n<br />

0<br />

0<br />

¯ ¯ ¯ O


~<br />

0<br />

0<br />

Z<br />

-338-


0<br />

0<br />

0


-336-


IJJ<br />

0<br />

._z<br />

o o<br />

-339-


This notk~e is i.~ed in sccordance<br />

~ri~ | 7.17 of ~e ~ ~u~s (15<br />

C~ P~ 7),, ~tabll~h~t of<br />

p~am for ~t~ee ~t test ~e<br />

computer md~’l ~m~t=~ of<br />

co~i~fions<br />

Depa~ent<br />

pm~is ~ ~ the<br />

of ~e~ ~o~ a<br />

by the Defense Co~~b~<br />

Aaency. A F~e~ ~~ no~<br />

a~ouncin8 the Rquesl tot Me ~l~ols<br />

~ wa. pub~bed oo D~m~r 30 1~<br />

(~ ~ 45~~). Co~en~ ~ceived<br />

in response to ~e a~o~cement were<br />

reviewed by the De(ense<br />

~~cabo~<br />

wbo~ ~tor,<br />

~~ Center<br />

We~ P. Hello.<br />

has con~ ~at ~ we~ no v~Iid<br />

reaso~ p~sented in ~e comment<br />

[~en to ~tvent establishment of the<br />

~tocols ~ and ~eR~om requested<br />

¯ e Nab~ ~au of St~dard. to<br />

P~


-341-


Header Compression<br />

for TCP/IP Datagrams<br />

Van Jacobson<br />

Lawrence Berkeley Laboratory<br />

IETF<br />

Cocoa Beach, FL<br />

April 11-14, 1989<br />

-343-


c"<br />

E<br />

C)<br />

0<br />

0<br />

><br />

0<br />

><br />

o<br />

E<br />

E<br />

o<br />

~- o<br />

-345-


0<br />

ii ~<br />

-346-


Data Throughput (% of line speed)<br />

5O 60<br />

70 80<br />

j<br />

2400 bps<br />

% %<br />

%%<br />

9600 bps<br />

19200 bps t<br />

90<br />

l<br />

I<br />

100<br />

!<br />

t<br />

I<br />

I<br />

I!I<br />

-347-


I IIII<br />

..~<br />

_.I<br />

<<br />

--348-


|<br />

¯<br />

o<br />

,©<br />

|<br />

, ~.<br />

-349-


-350 -


A A A A A<br />

¯ ¯ ¯ ¯ ¯ ¯ ¯<br />

¯ A . A ¯ A . A<br />

A ¯ A (~ A ¯ A ¯<br />

-351-


-35~-


4...3 4J<br />

4-.-) 4J<br />

A<br />

A<br />

¯ e ¯ ¯<br />

-353-


e ~ e<br />

0<br />

¯ ~ ¯ CD ¯ ed’) ¯ O9<br />

A A A A A<br />

-354--


Compression effectiveness - client side of telnet<br />

Header size (bytes)<br />

c-<br />

o~<br />

0<br />

0<br />

I<br />

-356-


~--" 0 0 0 0 0<br />

v--<br />

v- LO CO<br />

CO 0 r...D 0 0 0<br />

03 CO ’~" ~-- 0 CO<br />

v-<br />

O0 o<br />

~~Oxx<br />

E .x<br />

Compression effectiveness - client side of teinet<br />

o/<br />

10 20<br />

Header size (bytes)<br />

3O 40


VII. Papers Distributed at IETF<br />

Five documents were made available at the April IETF meeting. Four are enclosed. The<br />

remaining document entitled ."Inter- domain Intermediate Systems Routing", January 1989<br />

Draft Technical Report, ECMA TRBSK, Report # ECMA/TC32-TG10/89/... is not enclosed.<br />

This document was authored by the European Computer Manufacturers Association "to state<br />

the ECMA position with regard to Inter-Domain Routing; to serve as a vehicle for<br />

influencing decisions in other standard arenas; and to formalize the work carried out by<br />

ECMA". Inquiries concerning this particular document should be directed to Doug<br />

Montgomery/301-975-3630 or Tassos Nakassis/301-975-3632.<br />

-359-


INTERNET CLUSTER ADDRESSING SCHEME AND ITS APPLICATION TO PUBLIC DATA NETWORKS<br />

Carl-Herbert<br />

Rokit~nsky<br />

Fern University of Hagen,<br />

D-5860 !serlohn, FRG<br />

roki@A.ISI.EDU<br />

The DARPA <strong>Internet</strong> protocol suite (TCP/IP, FTP, SMTP, TELNET, etc.) has developed<br />

into de facto industry standard for heterogeneous packet-switching<br />

computer networks. However, it seems that the I~ternet community has neglected<br />

the highly important public data network community so far. Thus, the<br />

current <strong>Internet</strong> gateway architecture does not provide dynamic algorithms to<br />

route !nternet datagrams through public data networks.<br />

In this paper a new concept of an addressing scheme is presented, in which a<br />

set of <strong>Internet</strong> networks is associated to an !nternet cluster. Since this<br />

"Cluster Addressing Scheme" is of interest especially for wide-area networks<br />

(whose structure should be visible to the outside world for routing decisions),<br />

the application of the cluster addressing scheme to the system of<br />

X.25 public data networks is proposed. In addition the use of an addressmask<br />

(called "Cluster-Mask") for routing decisions within the cluster<br />

discussed. Finally, due to the fact that VAN-gateways interconnect a .data-<br />

.gram-oriented <strong>Internet</strong> world and a connection-oriented X.25 world, a new<br />

use of the IP Source Route option is proposed. The presented concept of the<br />

cluster addressing scheme provides a basis for the routing of <strong>Internet</strong> datagrams<br />

through X.25 public data networks and would therefore allow worldwide<br />

interoperation between the many local-area networks in various countries now<br />

using DARPA <strong>Internet</strong> TCP/iP protocols.<br />

INTRODUCTION<br />

The DARPA <strong>Internet</strong> system presently includes<br />

several thousand hosts connected<br />

to over 450 networks using over 250 gateways.<br />

It provides packet transport by<br />

means of a datagram service for hosts<br />

subscribing to the DARPA !nternet protocol<br />

suite. A host may be connected to<br />

more than one network. Each datagram contains<br />

a 32-bit source and destination<br />

address and travels independently through<br />

the <strong>Internet</strong>. Datagrams can be sent over<br />

different routes and they can be delivered<br />

out of order; if they get lost or<br />

contain errors, duplicate datagrams are<br />

retransmitted.<br />

The basic datagram protocol is the <strong>Internet</strong><br />

Protocol (IP) [l]. Error reporting,<br />

flow control, first-hop gateway redirection<br />

and other control functions are provided<br />

by the <strong>Internet</strong> Control Message<br />

Protocol (ICMP) [2]. The Transmission<br />

Control ?rotocol (TCP) provides reliable<br />

end-to-end data stream service. A much<br />

simpler transport protocol than TCP is<br />

the User Datagram Protocol (UDP). All<br />

user level prot:ocols above use either<br />

TCP/~P (e.g. FTP~ TELNET, SMTP) or UDP/IP<br />

(e.g. NAMESERVER) as the basic packet<br />

transport mechanism. Due to their widespread<br />

implementation under various operating<br />

systems these protocols have developed<br />

into de facto industry standards for<br />

heterogeneous ]jacket-switching computer<br />

networks.<br />

The <strong>Internet</strong> model includes constituent<br />

networks, called local networks, to distinguish<br />

them from the internet system as<br />

a whole. These local networks are connected<br />

together by means of <strong>Internet</strong><br />

gateways. Each gateway is connected to<br />

two or more networks by a physical interface<br />

and has an address on each of the<br />

local nets between which it provides datagram<br />

transport service. Gateways belonging<br />

to different gateway systems<br />

("autonomous systems") might use different<br />

intra-system routing mechanisms. In<br />

order to maintain the routing tables, an<br />

This work was carried out at the German Aerospace Research Establishment (DFVLR)<br />

part of the ~n%ernet research project and is ~on~inued a~ the Fern University of Hagen.<br />

-361-


interior gateway protocol like the Gateway-Gateway<br />

Protocol (GGP) [3]


Assume that direct connections can be established<br />

between the gateways and hosts<br />

attached to network W.<br />

According to the <strong>Internet</strong> routing model,<br />

packets from host HA to both HWI and HW2<br />

will be routed via gateway GAW (minimum<br />

hop count).<br />

If W is a homogeneous network (i.e. delays,<br />

costs, quality of links, etc. between<br />

hosts/gateways on W do not differ<br />

very much) then routing through network<br />

will be probably worse in any case. .<br />

Now assume that network W is inhomogeneous.<br />

For example the costs for a connection<br />

between GAW and HW2 are three times<br />

higher than between GBW and HW2. in this<br />

case it might be reasonable to route<br />

packets from HA to HW2 through network B<br />

via gateway GBW instead via GAW. Now, for<br />

[outing decisions, the internal structure<br />

of network W would be of interest even<br />

outside it. However the current <strong>Internet</strong><br />

gateway architecture does not provide any<br />

algorithms for this situation (due to<br />

"network-centric" routing), except that<br />

user on HA could specify GBW explicitly<br />

in an IP source route option.<br />

Note, that dividing network W into several<br />

subnets according to the internal<br />

structure of W would have no external<br />

effects, because it is invisible to the<br />

outside world as mentioned above. Therefore<br />

packets would still be routed from<br />

HA to HW2 via GAW and not through network<br />

B.<br />

Another idea would be to assign different<br />

!nternet network numbers to subdivisions<br />

(eog. x and Y, see Figure 3-2) of W, instead<br />

of assigning a single <strong>Internet</strong> network<br />

number to network W. Thus, network W<br />

would become a complex of several <strong>Internet</strong><br />

networks, and the structure of W<br />

would be visible even outside of it.<br />

because there are packets to "foreign"<br />

networks which need not be routed via a<br />

local gateway but can be sent directly:<br />

Consider packets to be sent from HX (former<br />

HW1) to HY (former HW2). Note that<br />

and HY are now hosts attached to different<br />

<strong>Internet</strong> networks, but direct connections<br />

can still be established between HX<br />

and HY without transiting an <strong>Internet</strong><br />

gateway! According to the current routing<br />

algorithms, HX would determine that the -<br />

destination HY is on a different ("foreign")<br />

<strong>Internet</strong> network and would therefore<br />

decide that the packets must be sent<br />

to a local gateway on the common network<br />

x. There is only one gateway GAX connected<br />

to network X, but transmitting packets<br />

to GAX would be unreasonable, since they<br />

can be sent directly to HY. But HY is<br />

neither a gateway nor is it a host on the<br />

local net. Similarly gateway GAX would<br />

encounter the same problems in its routing<br />

decision as; HX when forwarding packets<br />

to HY. In addition gateway GAX cannot<br />

send an ICMP Redirect message to HX specifying<br />

HY as a better first hop on the<br />

route towards the destination, because<br />

HYis not a host: on the same network.<br />

Therefore, the following model of a clustering<br />

scheme is proposed, which adds an<br />

additional level to the interpretation of<br />

!nternet addresses and is called "Cluster<br />

Addressing Scheme":<br />

3.1o Cluster Addressing Scheme Model<br />

Specific <strong>Internet</strong> network numbers are assigned<br />

to a set of nets between which direct<br />

connections can be established without<br />

transiting a gateway. These networks<br />

are associated to an "<strong>Internet</strong> Cluster".<br />

For all routing decisions within the<br />

cluster~ and ~or the speci~ica~£on that<br />

different <strong>Internet</strong> networks are associated<br />

to a cluster, the use of an addressmask,<br />

called "Cluster-Mask", is proposed.<br />

By means of this cluster-mask, all hosts<br />

within the same cluster, even if attached<br />

to different <strong>Internet</strong> networks appear to<br />

be local. ICMP Redirect messages can be<br />

sent directly between gateways and hosts<br />

belonging to the same cluster. The fact<br />

that several <strong>Internet</strong> networks are aggregated<br />

to an <strong>Internet</strong> cluster is invisible<br />

to the outside world. However the internal<br />

structure of the cluster, which is a<br />

complex of <strong>Internet</strong> networks ("clusternets"),<br />

is visible outside the cluster.<br />

The 32-bit INT~RN~T address consists of:<br />

3-2<br />

However this assignment would be inconsistent<br />

.with the current routing model,<br />

::=<br />

<br />

Now the cluster addressing scheme proposes<br />

that the field is<br />

interpreted as<br />

-363-


: :=<br />

<br />

Although this subdivision of the <br />

field is used for routing<br />

decisions within the cluster, it is invisible<br />

to the outside world°<br />

Thus, if this clustering scheme is in<br />

use, the INTERNET address can be interpreted<br />

as<br />

::=<br />

<br />

Consider the example of a (wide-area)<br />

network w as discussed above (Fig. 3-1).<br />

Assume that direct connections can be established<br />

(pairwise) between all hosts<br />

~nd gateways attached to network Wo Further<br />

assume that network W is inhomogeneous;<br />

’ for example the costs for a connection<br />

between GAWI (or HWI) and HW2 (or<br />

GBW2) are three times higher than between<br />

GAWI and HWl (or GBW2 and HW2)o Now, according<br />

to the cluster addressing scheme<br />

specific internet network numbers [wl]<br />

and [W2] are assigned to homogeneous subdivisions<br />

of W as shown in Figure 3.1-io<br />

These <strong>Internet</strong> networks Wl and W2 are associated<br />

to an <strong>Internet</strong> cluster (w-cluster).<br />

If packets are to be sent from HWl<br />

to HW2, host HWl can determine by means<br />

of a cluster-mask that HW2 is a "local"<br />

host since it belongs to the same cluster.<br />

Therefore, the packets can be routed<br />

directly ("locally") by establishing<br />

direct connection to h’W2. If for some<br />

reason the packets are sent to gateway<br />

GAWI, then~ according to the clustering<br />

scheme, GAWI can send an ICMP Redil:ect<br />

message to HWl specifying HW2 as a be~:ter<br />

first hod in this message. These routing<br />

mechanis~s are described in detail in the<br />

following sections.<br />

field are used to specify<br />

the cluster. In this cluster-mask all<br />

bits corresponding to the <br />

field are set to one, while the remaining<br />

bits are set to zero. If the<br />

width, of the field<br />

is zero (e.g., if the cluster-mask contains<br />

all ones in the <br />

field and zeros in the ) the<br />

net does not belong to any <strong>Internet</strong><br />

cluster°<br />

For example, if a set of class B networks<br />

with <strong>Internet</strong> addresses whose 8 highorder<br />

bits are identical is associated<br />

with an <strong>Internet</strong> cluster, the clustermask<br />

would have the following value:<br />

< res~- field ><br />

< rest - field ><br />

llllllll000000000000000000000000<br />

binary<br />

255. 0. 0. 0 decimal<br />

cluster-mask<br />

By means of this cluster-mask a host can<br />

determine if it is connected to a cluster-net.<br />

The host uses this mask for the<br />

routing decision if the destination IPaddress<br />

specified in a datagram is either<br />

"local" or "foreign" depending whether<br />

the destination is in the same cluster or<br />

not. All datagrams to local destinations<br />

(even on different <strong>Internet</strong> networks<br />

(cluster-nets)) can be sent directly<br />

the destination without transiting an<br />

<strong>Internet</strong> gateway.<br />

If the bitwise AND of this clustermask<br />

with the destination IP address<br />

("dg.ip_dest") matches the bitwise AND<br />

the ~ask with. the host’s own IF address<br />

("my ip addr"), the destination is assume~<br />

t~ be in the same cluster, and<br />

therefore the datagram can be sent directly<br />

("locally"); if not, the destination<br />

is assumed on a network outside the<br />

cluster, reachable only via a gateway.<br />

If an IP implementation supports subnets<br />

[7], (normally) no changes to the code<br />

are necessa~ Y ...... to support ’--" i- the mask" clustering must De<br />

scheme, except 5nmu ~_ ~_ ~<br />

assigned the value of the ciuster-mas~:<br />

IF bitwise and(dg.ip dest,my ip mask)<br />

THEN send dg locally(dg,dg.ip dest)<br />

ELSE send’-dg-locally(dg,gatew~y to<br />

(bitwise’-an~(dg.ip dest,my io ~ask)))<br />

3.3. ICMP Address Mask Request - Reply<br />

3.2. Clust.~<br />

A ho~t us~, a ~.’,-bit mask, called "clus-<br />

-t~r-m~k"’ %’~ ,~-termine which bits of the<br />

Todetermine which cluster-mask (address<br />

mask) is in use, the two ~CMP messages<br />

(specified in RFC-950 [7])<br />

- ICMP Address Mask Request<br />

- ICMP Address Mask Reply<br />

¯<br />

-364-


can be used without changes. ~ The address<br />

mask field of a Reply message contains<br />

the value of the 32-bit cluster-mask.<br />

3.4. ICMP Redirect Messages<br />

Due to the fact that all hosts and gateways<br />

within the same cluster appear to be<br />

reachable "locally", the cluster addressing<br />

scheme allows to send ICMP Redirect<br />

messages between gateways and hosts within<br />

the same CLUSTER and not only within<br />

a directly connected <strong>Internet</strong> NETWORK.<br />

This is a significant extension of the<br />

usage of the ICMP Redirect message.<br />

3.5° Advantages and Disadvantages<br />

The concept of associating a set of <strong>Internet</strong><br />

networks to an <strong>Internet</strong> cluster<br />

and the specification of a cluster-mask<br />

has the following advantages:<br />

- The internal structure of a cluster,<br />

consisting of a set of !nternet networks,<br />

is visible to the outside world.<br />

This can be important for routing decisions<br />

outside the cluster.<br />

Re~ark: The disadvatage of reserving<br />

<strong>Internet</strong> network numbers for the clustering<br />

scheme seems to be acceptable<br />

due to the fact (see RFC-1020 [5]) that<br />

with regard to a maximum number of<br />

126 Class A networks, 27 (21.4%)<br />

16382 Class S networks, 301 (1.8%)<br />

2097150 Class C networks, 7494 (0.4%.)<br />

network numbers are assigned, and especially<br />

those network classes (B and C)<br />

with the higher percentage (98.2 % and<br />

99.6 %) of available numbers are those<br />

which are of more interest for the<br />

clustering scheme.<br />

4. APPLICATION OF THE CLUSTERING SCHEME<br />

TO X.25 PUBLIC DATA NETWORKS<br />

The international, system of X.25 Public<br />

Data Networks (PDN) is a typical widearea<br />

network (WAN). In this system, the<br />

national packet-switched data networks in<br />

various countries are connected via gateways<br />

(CCITT, Rec. X.75 [8]) to allow international<br />

interworking between hosts on<br />

different national public data networks<br />

over international virtual circuits.<br />

- The fact that an <strong>Internet</strong> cluster has<br />

been formed is invisible outside the<br />

cluster. Therefore, no changes to the<br />

existing <strong>Internet</strong> gateway system are<br />

necessary to support the cluster addressing<br />

scheme.<br />

- All hosts (gateways) within the same<br />

cluster appear to be reachable directly<br />

("locally"). This is important for<br />

rou~ing decisions within the cluster.<br />

- No changes, or minor ones only, to<br />

hosts supporting subnets<br />

- ICMP Address Mask Request and Address<br />

Mask ReDly messages can be exchanged to<br />

determine which cluster-mask is in use.<br />

- ICMP Redirect messages can be used between<br />

gateways and hosts on different<br />

<strong>Internet</strong> networks, but within the same<br />

.cluster.<br />

Disadvantages<br />

are:<br />

- Specific <strong>Internet</strong> network numbers must<br />

be reserved for each cluster.<br />

For the implementation of the clustering<br />

scheme and for the reservation of<br />

<strong>Internet</strong> network numbers for specific<br />

clusters, it is proposed to assign (reserve)<br />

a number (depending on the number<br />

of bits (width) of the <br />

field of the )<br />

of the highest, not yet assigned<br />

network numbers of each class of<br />

networks.<br />

-365-<br />

4.1o Costs<br />

The costs for international virtual circuits<br />

differ from those for national virtual<br />

circuits and depend on:<br />

- The charge for the call request<br />

- The length of time the virtual circuit<br />

is open<br />

- The data volume transmitted over that<br />

circuit in units of "segments"<br />

Some ~acilities ("closed user ~roup",<br />

"reverse charging", etc.) are usually not<br />

available for international calls.<br />

4.2. X.121 Addressing<br />

An X.121 address (CCITT, Rec. X.121 [8])<br />

is assigned to each PDN host.<br />

This international data number consists<br />

of:<br />

::= <br />

or<br />

::= <br />

whe re<br />

DNIC .... Data Network-Identification<br />

(fixed at 4 digits)<br />

NTN .....Network Terminal Number<br />

(up to l0 digits)<br />

Code<br />

DCC ..... Data Country Code (fixed at<br />

digits, first 3 digits of DNIC)<br />

NN ...... National Number (up to iI digits)


DNIC . z denotes any digit from 2 thru 7<br />

zxxn (8..te!ex, 9..telephon)<br />

DCC x denotes any digit from 0 thru 9<br />

n denotes any digit from 0 thru 9<br />

(network digit)<br />

Thus, the system of data network identification<br />

codes (DNICs) as specified<br />

Rec. X.121 [8] provides a theoretical<br />

maximum of 6000 (resp. 8000) DNICs. However,<br />

only about 100 national public data<br />

networks are in operation so far.<br />

Currently an <strong>Internet</strong> class A network<br />

number [!4.rrr.rrr.rrr] is assigned to<br />

the system of public data networks (PDN).<br />

For the time being the assignment of<br />

<strong>Internet</strong> addresses to hosts (gateways)<br />

PDN is done successively in (chronological)<br />

order of request, regardless to<br />

which national public data network a host<br />

(gateway) belongs°<br />

Connectivity with the <strong>Internet</strong> is provided<br />

by so called "VAN gateways", which<br />

are attached to the national public data<br />

networks°<br />

4o3. Characteristics<br />

The PDN can be characterized<br />

as follows:<br />

- wide-area network<br />

- Complex of national public data networks<br />

- Internat. virtual circuits are provided<br />

- Different costs for international and<br />

national virtual circuits<br />

- Costs depend on length of time and data<br />

volume transfered<br />

- No broadcasting and no multicasting<br />

4.4. Routing Thru PDN - Current Situat.ion<br />

Due to the characterization above, the<br />

following requirements seem to be reasonable<br />

for the routing of !nternet datagrams<br />

through PDN:<br />

- Routing decisions should be done with<br />

regard to the structure of the PDN<br />

(complex of national public data net--<br />

works)<br />

- Packets between PDN hosts should be<br />

sent directly through the PDN over virtual<br />

circuits<br />

The current routing situation in the<br />

DARPA <strong>Internet</strong> with regard to PDN is<br />

very poor:<br />

Due to the assignment of a class A network<br />

number to the system of public data<br />

networks (PDN), no internal structure<br />

this PDN system is visible to the outside<br />

world. For this reason a division of the<br />

?DN into subnets would have no external<br />

effects.<br />

Currently, the PDN is declared reachable<br />

via the ,,BBN-~N-GATEWAY". However, since<br />

the ~’BBN-VAN-GATEWAY" does not provide<br />

international calls, PDN hosts on other<br />

national public data networks are unreachable<br />

from the <strong>Internet</strong> through PDN.<br />

(NOTE: A connection from (!) a PDN host<br />

to any <strong>Internet</strong> host via the "BBN-VAN-<br />

GATEWAY" is possible).<br />

Packets sent from a PDN host via a VAN<br />

gateway on the same national public data<br />

network to any !nternet host will reach<br />

the destination° However, due to the current<br />

routing in the <strong>Internet</strong>, which is<br />

,,network_centric ~’ not "gateway-centric",<br />

reply packets will be routed to the<br />

"BBN-VAN-GATEWAY"- Assuming that an international<br />

virtual circuit between the<br />

,,BBN_~VAN_GATEWAY" and the PDN host does<br />

not exist, these reply packets will not<br />

reach the PDN host, since the "BBN-<br />

VAN-GATEWAY" does not make international<br />

calls° Therefore, connections from PDN<br />

hosts via VAN gateways other than the<br />

"BBN--VAN-GATE%~Y" cannot be established.<br />

4.5° PDN-Cluster Addressing Scheme<br />

To allow an improved routing of <strong>Internet</strong><br />

datagrams thorough ~DN according to the<br />

<strong>Internet</strong> routing model, we propose to<br />

apply the "Cluster Addressing Scheme"<br />

(presented in Section 3 of this paper)<br />

the system of X.25 public data networks:<br />

a) <strong>Internet</strong> class B network numbers (with<br />

identical bits in the first (highorder)<br />

8-bit field of the <strong>Internet</strong> address)<br />

are assigned to national public<br />

data networks°<br />

b) The ~ national public data networks are<br />

associated, to an <strong>Internet</strong> cluster<br />

("?DN-Cluster")<br />

c) For the specification of this cluster<br />

and for routing decisions within the<br />

d)<br />

~:luster, a cluster-mask is used (value<br />

)~ thus all hosts within<br />

the PDN-C].uster appear to be reachable<br />

"locally"~<br />

ICMP Redirect Messages can be sen~ to<br />

any PDN host to manage the routing<br />

within the FDN-cluster.<br />

NOTE: No changes to the existing <strong>Internet</strong><br />

gateway syst,~m are necessary to support<br />

the cluster addressing scheme other than<br />

reserving a set of class B network numbers<br />

for the PDN-cluster and implementing<br />

this scheme on VAN-gateways and PDNhosts.<br />

On hosts supporting subnets [7]<br />

this can be done very easily by simply<br />

setting the address-mask to the value of<br />

the cluster-mask. Following is a detailed<br />

description of the PDN-cluster<br />

addressing scheme.<br />

-366-


4.6. PDN-C!uster<br />

Due to reasons of homogenity (cost structure,<br />

available network options, etc.)<br />

mapping between <strong>Internet</strong> network numbers<br />

and Data Network Identification Codes<br />

(DNICs, Recomm. X.121 [8]) is proposed.<br />

Therefore <strong>Internet</strong> class B network numbers<br />

with identical bits in the first<br />

(high-order) 8-bit field of the <strong>Internet</strong><br />

address (see below) are assigned to the<br />

different national public’ data networks.<br />

This allows a maximum number of 65.536<br />

PDN hosts on each network°<br />

The national public data networks are associated<br />

to an <strong>Internet</strong> cluster (PDNcluster).<br />

For this reason the 16-bit <br />

field (class B network) is divided<br />

into an n-bit field and<br />

a (16 minus n)-bit <br />

field:<br />

::=<br />

<br />

(n bits) + (16-n bits)<br />

In deciding how many bits of the <br />

field should be used for the<br />

field it seems to be<br />

reasonable to distinguish between:<br />

- Theoretical number of addressable DNICs<br />

(see Recomm. X.121 [8])<br />

- Number of reachable DNICs currently<br />

(and in the near future)<br />

The system of Data Network Identification<br />

Codes (DNICs) as specified in Rec. X.121<br />

[8] provides a theoretical maximum of<br />

6000 (resp. 8000) DN!CS.<br />

However, only about 100 different national<br />

public data networks are reachable<br />

currently.<br />

¯<br />

Even assuming an increase of additional<br />

public data networks, a maximum number of<br />

256 (254) addressable DNICs seems to<br />

sufficient for the near future<br />

Therefore, it is proposed to use an 8-bit<br />

-field for the PDN-cluster<br />

and an 8-bit field:<br />

::=<br />

<br />

(8 bits) (8 bits)<br />

This allows to address 256 (254) different<br />

national public data networks with<br />

65.536 FDN hosts on each.<br />

According to the cluster addressing<br />

scheme, the reservation of <strong>Internet</strong> network<br />

numbers for an <strong>Internet</strong> cluster<br />

should start with the highest, not yet<br />

assigned network numbers of each class.<br />

Therefore, the assignment of the clusternumber<br />

[191.nnn.rrr.rrr] to the PDN-cluster<br />

is proposed, thus to reserve 6he <strong>Internet</strong><br />

network-numbers [191.001.rrr.rrr]<br />

up to [191.254.rrr.rrr] for the different<br />

national public data networks.<br />

The assignment of !nternet network numbers<br />

to the national public data networks<br />

(different DNIC’s) could be done in the<br />

order of request (by grouping requests<br />

for zones 2 to 7).<br />

The following <strong>Internet</strong> network numbers<br />

could be assigned so far:<br />

DNIC Public Data Network INTE~NET ~<br />

2041 DATANET (Netherlands)<br />

2342 IPSS (U.K.)<br />

2405 TELEPAK (Sweden)<br />

2624 DATEX-P (West Germany)<br />

~llO<br />

~ELENET (US~)<br />

19!.001<br />

19!.002<br />

191.003<br />

19!.004<br />

191.09~<br />

reserved 19!. 255<br />

4.7. PDN-Cluster-Mask<br />

For the specification of the PDN-cluster<br />

and for internal routing decisions within<br />

the cluster<br />

3.2 above),<br />

(as described in detail in<br />

corresponding to the width of<br />

the field, a clustermask<br />

is used in which the first (highorder)<br />

8 bits are set to "one", while the<br />

remaining bits are set to "zero" (value<br />

).<br />

< rest - field ><br />

< rest - field ><br />

llllllll000000000000000000000000<br />

binary<br />

255. 0. 0. 0 decimal<br />

cluster-mask<br />

If the bitwise AND of this clustermask<br />

with the destination IP address<br />

("dg.ip_dest") matches the bitwise AND<br />

the mask with the host’s own IP address<br />

("my ip addr"), the destination is assume~<br />

t~ be in the same cluster and<br />

therefore the datagram can be sent directly<br />

("locally"); if not, the destination<br />

is assumed on a network outside the<br />

cluster, reachable only via a gateway.<br />

IF bitwise and(dg.ip dest,my ip mask)<br />

bi twise-and( my ip-addr, my-ip-mask<br />

THEN send dg-locall~(d~,dg.ip ~es~)<br />

ELSE send-dg~locally(dg,gatew~y_to<br />

(bitw[se_and(dg.ip_dest,my_zp_mask)))<br />

If an IP implementation supports suhnets,<br />

(normally) no changes to the code are


necessary to specify the FDN-cluster,<br />

except that "my~ip mask" must be assigned<br />

the value o~ ~he "PDN-cluster-mask"<br />

.<br />

Thus all PDN hosts within the PDN-cluster<br />

appear to be reachable "locally". In<br />

fact, direct national and international<br />

virtual circuits can be established between<br />

PDN hosts.<br />

4.8. ICMP Address Mask Request - Reply<br />

To determine which cluster-mask (address<br />

mask) is in use, the two ICMP messages<br />

(specified in RFC-950 [7]):<br />

- ICMP Address Mask Request (AM!)<br />

- ICMP Address Mask Reply (AM2)<br />

can be used without changes. The address<br />

mask field of a reply message contains<br />

the value of the PDN-cluster mask.<br />

4.9. ICMP Redirect Messages<br />

Due to the concept of the cluster addressing<br />

scheme all hosts and gateways<br />

within the same cluster (even on different<br />

Interne~ networks) appear to be<br />

reachable "locally". Therefore, to manage<br />

the routing within the PDN-cluster between<br />

PDN hosts and VAN gateways, ICMP<br />

Redirect messages can be sent to any host<br />

in the PDN-cluster, specifying any PDNgateway/host<br />

as a better first-hop towards<br />

the destination in the redirect<br />

message.<br />

4o10. IP Source Route Option Included by<br />

VI~N-Gateways<br />

While the PDN is based on connection<br />

oriented protocols, the <strong>Internet</strong> uses a<br />

a datagram oriented packet-switching<br />

technology. Therefore it miqht happen<br />

that packets between two !nternet hosts<br />

are not routed along the same path°<br />

Let us assume that<br />

gateways vl and v2<br />

there are two VAN<br />

and a PDN host HP1,<br />

which are attached to a national public<br />

data network P1 as shown in Figure<br />

4.10-i. To send packets to a host HA<br />

on network A~ HP1 establishes a switched<br />

virtual circuit to Vl. The packets forwarded<br />

by V1, are received at host HA;<br />

however, reply packets from HA to H~]o are<br />

routed (for some reason) to V2. Now~<br />

would have to open a virtual circuit<br />

HP1 to forward the packets to the destination<br />

HP!.<br />

Figure ~,. I0-I<br />

In most applications it seems to be reasonable<br />

to avoid such a situation for the<br />

following constraints:<br />

- Technical: HPI might<br />

with 1 logical<br />

be configurated<br />

channel only:<br />

Thus, an incoming call from V2<br />

cannot be accepted, if the virtual<br />

circuit to vl should remain<br />

established.<br />

- Costs: Two virtual circuits would be in<br />

use. Vl and V2 might accept incoming<br />

calls only, but do not<br />

open a connection to HPI since<br />

the calling site has to pay for<br />

the connection. (No reverse<br />

charging on international calls)<br />

Since many <strong>Internet</strong> hosts use the IP<br />

source route ,option, when it is. specified<br />

in received packets, even in their reply<br />

packets - a policy which is recommanded<br />

to be implemented on each host - a new<br />

use of the IP source route option is proposed<br />

to avoid the situation described<br />

above:<br />

VAN gateways include their own <strong>Internet</strong><br />

address (corresponding to the directly<br />

connected networ~ interface through which<br />

a packet is transmitted) as an IP source<br />

route option in those datagrams, which<br />

are received from the ,,PDN-cluster-net"<br />

interface and forwarded to another network<br />

interfaoe, by extending the <strong>Internet</strong><br />

header by 8 (resp. 4) octets according<br />

the following algorithm: o.<br />

-<br />

If no source route option is specifie~<br />

in the original datagram, the <strong>Internet</strong><br />

header is extended by 8 octets and the<br />

VAN gateway address is included as a<br />

Loose Source Route (LSR) option:<br />

-368-


- If a Loose Source Route (LSR) or<br />

Strict Source Route (SSR) option is already<br />

specified and the source route<br />

list does not contain the VAN gateways<br />

address, the source route list is extended<br />

by the VAN gateways address (4<br />

octets, inserted as indicated by the<br />

pointer); the option length and the<br />

pointer are incremented by 4:<br />

NOTE: Other options in the <strong>Internet</strong> header<br />

are uneffected; the source address and<br />

the destination address are left unchanged;<br />

if necessary, the <strong>Internet</strong> header<br />

is padded to a 32 bit boundary; the<br />

<strong>Internet</strong> Header Length (IHL), the Total<br />

Length and the Header Checksum are recomputed.<br />

Thus, packets from HPI via Vl to HA (see<br />

example above) are routed back (along the<br />

same path) from HA via V1 to HPI, if Vl<br />

includes its own internet address as an<br />

IP source route option in packets from<br />

HPI to HA, and HA uses this option in its<br />

reply packets to HP!o<br />

5o<br />

SUMMARY<br />

In this paper, a new concept of a cluster<br />

addressing scheme, in which a set of<br />

<strong>Internet</strong> networks is aggregated to an<br />

<strong>Internet</strong> cluster has been presented. Its<br />

application is of interest especially for<br />

WANs, since the structure of the WAN becomes<br />

visible even outside of it (important<br />

for <strong>Internet</strong> rout±n~), while the<br />

fact that a cluster has been formed is<br />

invisible outside the cluster. Therefore<br />

no changes to the existing <strong>Internet</strong> gateway<br />

system are necessary.<br />

For routing decisions the use ~f a cluster-mask<br />

is proposed; therefore all hosts<br />

within the cluster (even hosts on different<br />

<strong>Internet</strong> networks) appear to be<br />

reachable locally. If "my ip mask" is assigned<br />

the value of the crusher-mask, no<br />

changes, or minor ones, are necessary to<br />

support the cluster addressing scheme in<br />

hosts whose software allows the implementation<br />

of subnets. Even the two ICMP messages<br />

"Address Mask Request" and "Address<br />

Mask Reply" can be used without changes<br />

to determine which cluster-mask is in<br />

use° As a significant extension, !CMP Redirect<br />

messages can be used not only between<br />

gateways and hosts on the same<br />

<strong>Internet</strong> network, but also within the<br />

same cluster.<br />

In addition, the application of the proposed<br />

cluster addressing scheme to the<br />

system of X.25 Public Data Networks (PDN<br />

has been discussed. The PDN is a typical<br />

wide-area network, which consists of a<br />

number of national public data networks.<br />

Currently, due to the fact that only one<br />

<strong>Internet</strong> class A address is assigned to<br />

the PDN, it appears to be unstructured<br />

and therefore the routing of <strong>Internet</strong><br />

datagrams through the PDN is very poor.<br />

To provide an improved routing the application<br />

of the cluster addressing scheme<br />

is proposed by assigning <strong>Internet</strong> class B<br />

network numbers to the national public<br />

data networks and associating these networks<br />

to the PDN-cluster. The proposal<br />

involves no changes to the existing<br />

’ !nternet gateway system other than a<br />

policy reserving a set of class B network<br />

numbers for the PDN-cluster and implementing<br />

the cluster addressing scheme on<br />

VAN gateways and PDN hosts. For routing<br />

decisions within the cluster, the use of<br />

a cluster-mask has been discussed. PDN<br />

hosts whose software supports subnets can<br />

be equipped easily with the cluster addressing<br />

scheme. Finally, with regard to<br />

the connection-oriented characteristics<br />

of the PDN, a new use of the IP source<br />

route option (included by VAN gateways)<br />

has been discussed. The implementation of<br />

the proposed cluster addressing scheme<br />

would allow worldwide interoperation beween<br />

the many local area networks in<br />

various countries now using DARPA-<strong>Internet</strong><br />

TCP/!P protocols.<br />

ACKNOWLEDGMENT<br />

It has been the poor routing of <strong>Internet</strong><br />

datagrams through PDN, especially from<br />

the European point of view, which caused<br />

the ~evelopment of the cluster addressing<br />

scheme and its application to FDN as described<br />

here. J. Noel Chiappa, Horst D.<br />

Clausen, J.J. Garcia-Luna, Dave Mills and<br />

Jon Postel provided helpful discussions<br />

and important suggestions.<br />

REFERENCES<br />

[!] Postel, J., ed., "!nternet Protocol -<br />

DARPA In~ernet Program Protocol Specification",<br />

DARPA Network Working<br />

Group Request For Comments RFC-791,<br />

USC/Information Sciences Institute,<br />

Sept. 1981.<br />

[2] Postel, Jo, ed., "<strong>Internet</strong> Control<br />

Message ~rotocol - DAR~A <strong>Internet</strong><br />

Program Protocol Specification",<br />

RFC-792, USC/Information Sciences<br />

Institute, Sept. 1981.<br />

[3] Hinden, R., Sheltzer, A., "The DARPA<br />

<strong>Internet</strong> Gateway", RFC-823, Bolt,<br />

Beranek and Newman Inc., Sept. 198Z.<br />

-369-


[4]<br />

Mills, D.L., "Exterior Gateway Protocol<br />

Formal Specification", RFC-904,<br />

M/A-COM Linkabit, Apr. 1984.<br />

[5] Romano, S., Stahl, M., "<strong>Internet</strong> Numbers",<br />

RFC-1020, Stanford<br />

Resea~:ch<br />

International, Nov. 1987.<br />

[6] GADS, "Toward an <strong>Internet</strong><br />

Standard<br />

Scheme for Subnetting", RFC-940,<br />

DARPA <strong>Internet</strong> Gateway Algorithms and<br />

Data Structures <strong>Task</strong> <strong>Force</strong>, Apr. 1985<br />

[7]<br />

Mogul, J., Postel, J., "<strong>Internet</strong><br />

Standard Subnetting Procedure", RFC-<br />

950, Stanford University and USC/!nformation<br />

Sciences Inst.~ Aug. 1985.<br />

[8] CCITT, Data Communication Networks.<br />

Transmission, Signalling and Switching,<br />

Network Aspects, Maintainance,<br />

Administrative Arrangements, Recommendations<br />

X.40 - X.180, Yellow Book,<br />

Volo VIII - Fascicle VIII.3, Geneva,<br />

1981<br />

Carl-H. Rokitansky is<br />

with the Fern University<br />

of Hagen where he is<br />

engaged in research on<br />

computer networks and<br />

their protocols. He is<br />

particularly interested<br />

in the design, modeling<br />

and analysis of routing<br />

algorithms for large<br />

mobile networks, and in<br />

developing gateway algorithms<br />

for the interconnection of computer<br />

networks° Until recently he joined<br />

the Telecommunications Institute of the<br />

German Aerospace Research Establishment<br />

(DFVLR). He received his JD from the<br />

University of[ Salzburg and his MS degree<br />

in economics (special field mathematical<br />

statistics and computer science) from the<br />

University of Vienna. In 1986/1987<br />

Dr. Rokitansky was a faculty member in<br />

the Electr±cal and Computer <strong>Engineering</strong><br />

department of the University of Kansas in<br />

Lawrence. He is a member of the <strong>Internet</strong><br />

<strong>Engineering</strong> <strong>Task</strong> <strong>Force</strong> and is chairing<br />

the Public Data Network Routing working<br />

group of the IETF.<br />

-370-


-371-


i I ! !<br />

.,.4<br />

~ .~.<br />

-372--


-373-


-374-


II’I<br />

I<br />

000~0<br />

-375-


--376-


-377-


-.378-


-379-


’O0<br />

0<br />

©<br />

< -r<br />

-381-


-382-


-’384-


-386-


~ 0<br />

4-I<br />

-387-


-388-


-389-


-390-


-391-


-392-


-393-


-394-


-397-


398-


United States Department of Commerce<br />

National Institute ol: Standards and Technology<br />

Certificate of Accreditation<br />

LABORATORY,<br />

INC<br />

is recognized under the National Voluntary Laboratory Accredilation Program<br />

for satisfactory compliance with criteria e~tablished in Title 15, Part 7 Code of Federal Regulatio.s.<br />

Accreditation is awarded [or specific ser~ice~, listed on the Scope of Accredilation. [or:.<br />

COMPUTER NETWORK INTERFACE PROTOCOLS<br />

January, I, 19--<br />

until<br />

-399~


’,-<br />

,_O&<br />

o0~ ~ I<br />

<<br />

r~<br />

©<br />

0 ~<br />

©<br />

o<br />

uJ o<br />

> -r"


o<br />

-403-<br />

¯ .


0~ o<br />

~4 o<br />

o o<br />

.<br />

o<br />

o<br />

~ ¯<br />

-404-.


0 0 0 0


0 0 0

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!